Aug 13 03:46:22.958072 kernel: Linux version 5.15.189-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Aug 12 23:01:50 -00 2025 Aug 13 03:46:22.958123 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8f8aacd9fbcdd713563d390e899e90bedf5577e4b1b261b4e57687d87edd6b57 Aug 13 03:46:22.958145 kernel: BIOS-provided physical RAM map: Aug 13 03:46:22.958155 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Aug 13 03:46:22.958165 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Aug 13 03:46:22.958175 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Aug 13 03:46:22.958187 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Aug 13 03:46:22.958198 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Aug 13 03:46:22.958208 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Aug 13 03:46:22.958218 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Aug 13 03:46:22.958233 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Aug 13 03:46:22.958243 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Aug 13 03:46:22.958253 kernel: NX (Execute Disable) protection: active Aug 13 03:46:22.958263 kernel: SMBIOS 2.8 present. Aug 13 03:46:22.958276 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Aug 13 03:46:22.958287 kernel: Hypervisor detected: KVM Aug 13 03:46:22.958303 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Aug 13 03:46:22.958314 kernel: kvm-clock: cpu 0, msr 4e19e001, primary cpu clock Aug 13 03:46:22.958325 kernel: kvm-clock: using sched offset of 5441508486 cycles Aug 13 03:46:22.958337 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Aug 13 03:46:22.958348 kernel: tsc: Detected 2499.998 MHz processor Aug 13 03:46:22.958359 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Aug 13 03:46:22.958371 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Aug 13 03:46:22.958382 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Aug 13 03:46:22.958393 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Aug 13 03:46:22.958409 kernel: Using GB pages for direct mapping Aug 13 03:46:22.958420 kernel: ACPI: Early table checksum verification disabled Aug 13 03:46:22.958431 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Aug 13 03:46:22.958442 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Aug 13 03:46:22.958453 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Aug 13 03:46:22.958464 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Aug 13 03:46:22.958475 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Aug 13 03:46:22.958486 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Aug 13 03:46:22.958498 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Aug 13 03:46:22.958513 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Aug 13 03:46:22.958524 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Aug 13 03:46:22.958535 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Aug 13 03:46:22.958546 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Aug 13 03:46:22.958557 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Aug 13 03:46:22.958568 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Aug 13 03:46:22.958585 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Aug 13 03:46:22.958601 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Aug 13 03:46:22.958622 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Aug 13 03:46:22.958636 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Aug 13 03:46:22.958648 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Aug 13 03:46:22.958660 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Aug 13 03:46:22.958671 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Aug 13 03:46:22.958683 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Aug 13 03:46:22.958699 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Aug 13 03:46:22.958711 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Aug 13 03:46:22.958723 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Aug 13 03:46:22.958734 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Aug 13 03:46:22.958746 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Aug 13 03:46:22.958757 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Aug 13 03:46:22.958769 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Aug 13 03:46:22.958780 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Aug 13 03:46:22.958792 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Aug 13 03:46:22.958803 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Aug 13 03:46:22.958819 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Aug 13 03:46:22.958831 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Aug 13 03:46:22.958843 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Aug 13 03:46:22.958855 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Aug 13 03:46:22.958866 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Aug 13 03:46:22.958878 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Aug 13 03:46:22.958890 kernel: Zone ranges: Aug 13 03:46:22.958902 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Aug 13 03:46:22.958913 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Aug 13 03:46:22.958957 kernel: Normal empty Aug 13 03:46:22.958970 kernel: Movable zone start for each node Aug 13 03:46:22.958981 kernel: Early memory node ranges Aug 13 03:46:22.958993 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Aug 13 03:46:22.959005 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Aug 13 03:46:22.959016 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Aug 13 03:46:22.959028 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Aug 13 03:46:22.959040 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Aug 13 03:46:22.959051 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Aug 13 03:46:22.959068 kernel: ACPI: PM-Timer IO Port: 0x608 Aug 13 03:46:22.959080 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Aug 13 03:46:22.959092 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Aug 13 03:46:22.959104 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Aug 13 03:46:22.959115 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Aug 13 03:46:22.959127 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Aug 13 03:46:22.959139 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Aug 13 03:46:22.959151 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Aug 13 03:46:22.959163 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Aug 13 03:46:22.959179 kernel: TSC deadline timer available Aug 13 03:46:22.959191 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Aug 13 03:46:22.959202 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Aug 13 03:46:22.959214 kernel: Booting paravirtualized kernel on KVM Aug 13 03:46:22.959226 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Aug 13 03:46:22.959238 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Aug 13 03:46:22.959250 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Aug 13 03:46:22.959262 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Aug 13 03:46:22.959274 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Aug 13 03:46:22.959290 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Aug 13 03:46:22.959301 kernel: kvm-guest: PV spinlocks enabled Aug 13 03:46:22.959313 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Aug 13 03:46:22.959325 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Aug 13 03:46:22.959337 kernel: Policy zone: DMA32 Aug 13 03:46:22.959350 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8f8aacd9fbcdd713563d390e899e90bedf5577e4b1b261b4e57687d87edd6b57 Aug 13 03:46:22.959362 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Aug 13 03:46:22.959374 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Aug 13 03:46:22.959390 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Aug 13 03:46:22.959402 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Aug 13 03:46:22.959414 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47488K init, 4092K bss, 192524K reserved, 0K cma-reserved) Aug 13 03:46:22.959426 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Aug 13 03:46:22.959438 kernel: Kernel/User page tables isolation: enabled Aug 13 03:46:22.959450 kernel: ftrace: allocating 34608 entries in 136 pages Aug 13 03:46:22.959461 kernel: ftrace: allocated 136 pages with 2 groups Aug 13 03:46:22.959473 kernel: rcu: Hierarchical RCU implementation. Aug 13 03:46:22.959486 kernel: rcu: RCU event tracing is enabled. Aug 13 03:46:22.959502 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Aug 13 03:46:22.959514 kernel: Rude variant of Tasks RCU enabled. Aug 13 03:46:22.959526 kernel: Tracing variant of Tasks RCU enabled. Aug 13 03:46:22.959538 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Aug 13 03:46:22.959550 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Aug 13 03:46:22.959562 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Aug 13 03:46:22.959573 kernel: random: crng init done Aug 13 03:46:22.959600 kernel: Console: colour VGA+ 80x25 Aug 13 03:46:22.959612 kernel: printk: console [tty0] enabled Aug 13 03:46:22.959635 kernel: printk: console [ttyS0] enabled Aug 13 03:46:22.959647 kernel: ACPI: Core revision 20210730 Aug 13 03:46:22.959659 kernel: APIC: Switch to symmetric I/O mode setup Aug 13 03:46:22.959676 kernel: x2apic enabled Aug 13 03:46:22.959689 kernel: Switched APIC routing to physical x2apic. Aug 13 03:46:22.959701 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Aug 13 03:46:22.959714 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Aug 13 03:46:22.959726 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Aug 13 03:46:22.959743 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Aug 13 03:46:22.959755 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Aug 13 03:46:22.959768 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Aug 13 03:46:22.959780 kernel: Spectre V2 : Mitigation: Retpolines Aug 13 03:46:22.959792 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Aug 13 03:46:22.959804 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Aug 13 03:46:22.959817 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Aug 13 03:46:22.959829 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Aug 13 03:46:22.959841 kernel: MDS: Mitigation: Clear CPU buffers Aug 13 03:46:22.959853 kernel: MMIO Stale Data: Unknown: No mitigations Aug 13 03:46:22.959865 kernel: SRBDS: Unknown: Dependent on hypervisor status Aug 13 03:46:22.959882 kernel: ITS: Mitigation: Aligned branch/return thunks Aug 13 03:46:22.959894 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Aug 13 03:46:22.959906 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Aug 13 03:46:22.959918 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Aug 13 03:46:22.959953 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Aug 13 03:46:22.959966 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Aug 13 03:46:22.959979 kernel: Freeing SMP alternatives memory: 32K Aug 13 03:46:22.959991 kernel: pid_max: default: 32768 minimum: 301 Aug 13 03:46:22.960003 kernel: LSM: Security Framework initializing Aug 13 03:46:22.960015 kernel: SELinux: Initializing. Aug 13 03:46:22.960027 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Aug 13 03:46:22.960046 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Aug 13 03:46:22.960058 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Aug 13 03:46:22.960071 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Aug 13 03:46:22.960083 kernel: signal: max sigframe size: 1776 Aug 13 03:46:22.960095 kernel: rcu: Hierarchical SRCU implementation. Aug 13 03:46:22.960108 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Aug 13 03:46:22.960120 kernel: smp: Bringing up secondary CPUs ... Aug 13 03:46:22.960132 kernel: x86: Booting SMP configuration: Aug 13 03:46:22.960145 kernel: .... node #0, CPUs: #1 Aug 13 03:46:22.960161 kernel: kvm-clock: cpu 1, msr 4e19e041, secondary cpu clock Aug 13 03:46:22.960174 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Aug 13 03:46:22.960186 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Aug 13 03:46:22.960198 kernel: smp: Brought up 1 node, 2 CPUs Aug 13 03:46:22.960211 kernel: smpboot: Max logical packages: 16 Aug 13 03:46:22.960223 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Aug 13 03:46:22.960235 kernel: devtmpfs: initialized Aug 13 03:46:22.960247 kernel: x86/mm: Memory block size: 128MB Aug 13 03:46:22.960260 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Aug 13 03:46:22.960272 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Aug 13 03:46:22.960289 kernel: pinctrl core: initialized pinctrl subsystem Aug 13 03:46:22.960302 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Aug 13 03:46:22.960314 kernel: audit: initializing netlink subsys (disabled) Aug 13 03:46:22.960326 kernel: thermal_sys: Registered thermal governor 'step_wise' Aug 13 03:46:22.960339 kernel: thermal_sys: Registered thermal governor 'user_space' Aug 13 03:46:22.960351 kernel: audit: type=2000 audit(1755056781.143:1): state=initialized audit_enabled=0 res=1 Aug 13 03:46:22.960363 kernel: cpuidle: using governor menu Aug 13 03:46:22.960375 kernel: ACPI: bus type PCI registered Aug 13 03:46:22.960388 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Aug 13 03:46:22.960405 kernel: dca service started, version 1.12.1 Aug 13 03:46:22.960417 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Aug 13 03:46:22.960430 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Aug 13 03:46:22.960442 kernel: PCI: Using configuration type 1 for base access Aug 13 03:46:22.960454 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Aug 13 03:46:22.960467 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Aug 13 03:46:22.960479 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Aug 13 03:46:22.960492 kernel: ACPI: Added _OSI(Module Device) Aug 13 03:46:22.960508 kernel: ACPI: Added _OSI(Processor Device) Aug 13 03:46:22.960521 kernel: ACPI: Added _OSI(Processor Aggregator Device) Aug 13 03:46:22.960533 kernel: ACPI: Added _OSI(Linux-Dell-Video) Aug 13 03:46:22.960545 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Aug 13 03:46:22.960558 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Aug 13 03:46:22.960570 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Aug 13 03:46:22.960582 kernel: ACPI: Interpreter enabled Aug 13 03:46:22.960594 kernel: ACPI: PM: (supports S0 S5) Aug 13 03:46:22.960606 kernel: ACPI: Using IOAPIC for interrupt routing Aug 13 03:46:22.960628 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Aug 13 03:46:22.960647 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Aug 13 03:46:22.960659 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Aug 13 03:46:22.961111 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Aug 13 03:46:22.961317 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Aug 13 03:46:22.961507 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Aug 13 03:46:22.961526 kernel: PCI host bridge to bus 0000:00 Aug 13 03:46:22.961810 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Aug 13 03:46:22.961987 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Aug 13 03:46:22.962188 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Aug 13 03:46:22.962353 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Aug 13 03:46:22.962514 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Aug 13 03:46:22.962678 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Aug 13 03:46:22.962828 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Aug 13 03:46:22.969187 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Aug 13 03:46:22.969410 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Aug 13 03:46:22.969592 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Aug 13 03:46:22.969875 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Aug 13 03:46:22.970089 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Aug 13 03:46:22.970253 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Aug 13 03:46:22.970431 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Aug 13 03:46:22.970611 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Aug 13 03:46:22.970816 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Aug 13 03:46:22.970997 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Aug 13 03:46:22.971185 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Aug 13 03:46:22.971347 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Aug 13 03:46:22.971518 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Aug 13 03:46:22.971700 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Aug 13 03:46:22.971897 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Aug 13 03:46:22.972073 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Aug 13 03:46:22.972246 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Aug 13 03:46:22.972406 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Aug 13 03:46:22.972635 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Aug 13 03:46:22.972811 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Aug 13 03:46:22.973004 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Aug 13 03:46:22.973167 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Aug 13 03:46:22.973340 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Aug 13 03:46:22.973585 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Aug 13 03:46:22.973829 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Aug 13 03:46:22.974048 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Aug 13 03:46:22.974228 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Aug 13 03:46:22.974419 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Aug 13 03:46:22.974634 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Aug 13 03:46:22.974802 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Aug 13 03:46:22.974982 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Aug 13 03:46:22.975159 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Aug 13 03:46:22.975319 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Aug 13 03:46:22.975514 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Aug 13 03:46:22.975695 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Aug 13 03:46:22.975858 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Aug 13 03:46:22.984237 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Aug 13 03:46:22.984453 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Aug 13 03:46:22.984661 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Aug 13 03:46:22.984850 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Aug 13 03:46:22.985049 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Aug 13 03:46:22.985231 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Aug 13 03:46:22.985410 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Aug 13 03:46:22.985594 kernel: pci_bus 0000:02: extended config space not accessible Aug 13 03:46:22.985825 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Aug 13 03:46:22.986042 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Aug 13 03:46:22.986211 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Aug 13 03:46:22.986377 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Aug 13 03:46:22.986559 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Aug 13 03:46:22.986759 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Aug 13 03:46:22.986941 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Aug 13 03:46:22.987110 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Aug 13 03:46:22.987276 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Aug 13 03:46:22.987482 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Aug 13 03:46:22.987669 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Aug 13 03:46:22.987839 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Aug 13 03:46:22.988024 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Aug 13 03:46:22.988182 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Aug 13 03:46:22.988343 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Aug 13 03:46:22.988500 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Aug 13 03:46:22.988681 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Aug 13 03:46:22.988862 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Aug 13 03:46:22.989037 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Aug 13 03:46:22.989200 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Aug 13 03:46:22.989368 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Aug 13 03:46:22.989529 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Aug 13 03:46:22.989705 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Aug 13 03:46:22.989875 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Aug 13 03:46:22.990069 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Aug 13 03:46:22.990234 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Aug 13 03:46:22.990397 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Aug 13 03:46:22.990559 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Aug 13 03:46:22.990736 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Aug 13 03:46:22.990756 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Aug 13 03:46:22.990770 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Aug 13 03:46:22.990783 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Aug 13 03:46:22.990803 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Aug 13 03:46:22.990816 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Aug 13 03:46:22.990829 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Aug 13 03:46:22.990842 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Aug 13 03:46:22.990855 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Aug 13 03:46:22.990868 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Aug 13 03:46:22.990880 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Aug 13 03:46:22.990893 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Aug 13 03:46:22.990906 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Aug 13 03:46:22.997970 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Aug 13 03:46:22.998020 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Aug 13 03:46:22.998034 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Aug 13 03:46:22.998048 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Aug 13 03:46:22.998060 kernel: iommu: Default domain type: Translated Aug 13 03:46:22.998074 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Aug 13 03:46:22.998332 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Aug 13 03:46:22.998500 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Aug 13 03:46:22.998692 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Aug 13 03:46:22.998714 kernel: vgaarb: loaded Aug 13 03:46:22.998727 kernel: pps_core: LinuxPPS API ver. 1 registered Aug 13 03:46:22.998741 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Aug 13 03:46:22.998754 kernel: PTP clock support registered Aug 13 03:46:22.998766 kernel: PCI: Using ACPI for IRQ routing Aug 13 03:46:22.998779 kernel: PCI: pci_cache_line_size set to 64 bytes Aug 13 03:46:22.998792 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Aug 13 03:46:22.998805 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Aug 13 03:46:22.998824 kernel: clocksource: Switched to clocksource kvm-clock Aug 13 03:46:22.998837 kernel: VFS: Disk quotas dquot_6.6.0 Aug 13 03:46:22.998851 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Aug 13 03:46:22.998863 kernel: pnp: PnP ACPI init Aug 13 03:46:22.999105 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Aug 13 03:46:22.999129 kernel: pnp: PnP ACPI: found 5 devices Aug 13 03:46:22.999142 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Aug 13 03:46:22.999156 kernel: NET: Registered PF_INET protocol family Aug 13 03:46:22.999176 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Aug 13 03:46:22.999189 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Aug 13 03:46:22.999202 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Aug 13 03:46:22.999215 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Aug 13 03:46:22.999228 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Aug 13 03:46:22.999240 kernel: TCP: Hash tables configured (established 16384 bind 16384) Aug 13 03:46:22.999253 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Aug 13 03:46:22.999266 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Aug 13 03:46:22.999279 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Aug 13 03:46:22.999297 kernel: NET: Registered PF_XDP protocol family Aug 13 03:46:22.999464 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Aug 13 03:46:22.999645 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Aug 13 03:46:22.999815 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Aug 13 03:46:23.000011 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Aug 13 03:46:23.000179 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Aug 13 03:46:23.000351 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Aug 13 03:46:23.000520 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Aug 13 03:46:23.000701 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Aug 13 03:46:23.000885 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Aug 13 03:46:23.001073 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Aug 13 03:46:23.001235 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Aug 13 03:46:23.001396 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Aug 13 03:46:23.001568 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Aug 13 03:46:23.001746 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Aug 13 03:46:23.001906 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Aug 13 03:46:23.002086 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Aug 13 03:46:23.002255 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Aug 13 03:46:23.002423 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Aug 13 03:46:23.002581 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Aug 13 03:46:23.002759 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Aug 13 03:46:23.002942 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Aug 13 03:46:23.003108 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Aug 13 03:46:23.003279 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Aug 13 03:46:23.003468 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Aug 13 03:46:23.003642 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Aug 13 03:46:23.003808 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Aug 13 03:46:23.003981 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Aug 13 03:46:23.004145 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Aug 13 03:46:23.004308 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Aug 13 03:46:23.004557 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Aug 13 03:46:23.004791 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Aug 13 03:46:23.016292 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Aug 13 03:46:23.016535 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Aug 13 03:46:23.016719 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Aug 13 03:46:23.016888 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Aug 13 03:46:23.017083 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Aug 13 03:46:23.017247 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Aug 13 03:46:23.017428 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Aug 13 03:46:23.017595 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Aug 13 03:46:23.017774 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Aug 13 03:46:23.017951 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Aug 13 03:46:23.018116 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Aug 13 03:46:23.018284 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Aug 13 03:46:23.018455 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Aug 13 03:46:23.018875 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Aug 13 03:46:23.019071 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Aug 13 03:46:23.019239 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Aug 13 03:46:23.019410 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Aug 13 03:46:23.019595 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Aug 13 03:46:23.019791 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Aug 13 03:46:23.019975 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Aug 13 03:46:23.020135 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Aug 13 03:46:23.020298 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Aug 13 03:46:23.020458 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Aug 13 03:46:23.020607 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Aug 13 03:46:23.020780 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Aug 13 03:46:23.020972 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Aug 13 03:46:23.021153 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Aug 13 03:46:23.021322 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Aug 13 03:46:23.021506 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Aug 13 03:46:23.021704 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Aug 13 03:46:23.021874 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Aug 13 03:46:23.022057 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Aug 13 03:46:23.022242 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Aug 13 03:46:23.022408 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Aug 13 03:46:23.022562 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Aug 13 03:46:23.022759 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Aug 13 03:46:23.030018 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Aug 13 03:46:23.030313 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Aug 13 03:46:23.030492 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Aug 13 03:46:23.030683 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Aug 13 03:46:23.030841 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Aug 13 03:46:23.031038 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Aug 13 03:46:23.031195 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Aug 13 03:46:23.031349 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Aug 13 03:46:23.031526 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Aug 13 03:46:23.031700 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Aug 13 03:46:23.031867 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Aug 13 03:46:23.032239 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Aug 13 03:46:23.032396 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Aug 13 03:46:23.032547 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Aug 13 03:46:23.032569 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Aug 13 03:46:23.032583 kernel: PCI: CLS 0 bytes, default 64 Aug 13 03:46:23.032597 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Aug 13 03:46:23.032611 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Aug 13 03:46:23.032644 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Aug 13 03:46:23.032658 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Aug 13 03:46:23.032672 kernel: Initialise system trusted keyrings Aug 13 03:46:23.032686 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Aug 13 03:46:23.032700 kernel: Key type asymmetric registered Aug 13 03:46:23.032713 kernel: Asymmetric key parser 'x509' registered Aug 13 03:46:23.032727 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Aug 13 03:46:23.032740 kernel: io scheduler mq-deadline registered Aug 13 03:46:23.032754 kernel: io scheduler kyber registered Aug 13 03:46:23.032772 kernel: io scheduler bfq registered Aug 13 03:46:23.032960 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Aug 13 03:46:23.033126 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Aug 13 03:46:23.033286 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Aug 13 03:46:23.033449 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Aug 13 03:46:23.033608 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Aug 13 03:46:23.033780 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Aug 13 03:46:23.033984 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Aug 13 03:46:23.034145 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Aug 13 03:46:23.034303 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Aug 13 03:46:23.034464 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Aug 13 03:46:23.034633 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Aug 13 03:46:23.034792 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Aug 13 03:46:23.034977 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Aug 13 03:46:23.035138 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Aug 13 03:46:23.035296 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Aug 13 03:46:23.035457 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Aug 13 03:46:23.035629 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Aug 13 03:46:23.035793 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Aug 13 03:46:23.035978 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Aug 13 03:46:23.036147 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Aug 13 03:46:23.036309 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Aug 13 03:46:23.036472 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Aug 13 03:46:23.036650 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Aug 13 03:46:23.036811 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Aug 13 03:46:23.036839 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Aug 13 03:46:23.036854 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Aug 13 03:46:23.036868 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Aug 13 03:46:23.036881 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Aug 13 03:46:23.036895 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Aug 13 03:46:23.036909 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Aug 13 03:46:23.036941 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Aug 13 03:46:23.036957 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Aug 13 03:46:23.037137 kernel: rtc_cmos 00:03: RTC can wake from S4 Aug 13 03:46:23.037160 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Aug 13 03:46:23.037310 kernel: rtc_cmos 00:03: registered as rtc0 Aug 13 03:46:23.037465 kernel: rtc_cmos 00:03: setting system clock to 2025-08-13T03:46:22 UTC (1755056782) Aug 13 03:46:23.037629 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Aug 13 03:46:23.037649 kernel: intel_pstate: CPU model not supported Aug 13 03:46:23.037663 kernel: NET: Registered PF_INET6 protocol family Aug 13 03:46:23.037683 kernel: Segment Routing with IPv6 Aug 13 03:46:23.037697 kernel: In-situ OAM (IOAM) with IPv6 Aug 13 03:46:23.037710 kernel: NET: Registered PF_PACKET protocol family Aug 13 03:46:23.037724 kernel: Key type dns_resolver registered Aug 13 03:46:23.037737 kernel: IPI shorthand broadcast: enabled Aug 13 03:46:23.037751 kernel: sched_clock: Marking stable (978908002, 224045762)->(1492885999, -289932235) Aug 13 03:46:23.037764 kernel: registered taskstats version 1 Aug 13 03:46:23.037777 kernel: Loading compiled-in X.509 certificates Aug 13 03:46:23.037791 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.189-flatcar: 1d5a64b5798e654719a8bd91d683e7e9894bd433' Aug 13 03:46:23.037809 kernel: Key type .fscrypt registered Aug 13 03:46:23.037822 kernel: Key type fscrypt-provisioning registered Aug 13 03:46:23.037835 kernel: ima: No TPM chip found, activating TPM-bypass! Aug 13 03:46:23.037849 kernel: ima: Allocated hash algorithm: sha1 Aug 13 03:46:23.037862 kernel: ima: No architecture policies found Aug 13 03:46:23.037875 kernel: clk: Disabling unused clocks Aug 13 03:46:23.037889 kernel: Freeing unused kernel image (initmem) memory: 47488K Aug 13 03:46:23.037902 kernel: Write protecting the kernel read-only data: 28672k Aug 13 03:46:23.037915 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Aug 13 03:46:23.037947 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Aug 13 03:46:23.037962 kernel: Run /init as init process Aug 13 03:46:23.037980 kernel: with arguments: Aug 13 03:46:23.037994 kernel: /init Aug 13 03:46:23.038007 kernel: with environment: Aug 13 03:46:23.038020 kernel: HOME=/ Aug 13 03:46:23.038033 kernel: TERM=linux Aug 13 03:46:23.038045 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Aug 13 03:46:23.038073 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Aug 13 03:46:23.038099 systemd[1]: Detected virtualization kvm. Aug 13 03:46:23.038114 systemd[1]: Detected architecture x86-64. Aug 13 03:46:23.038128 systemd[1]: Running in initrd. Aug 13 03:46:23.038141 systemd[1]: No hostname configured, using default hostname. Aug 13 03:46:23.038155 systemd[1]: Hostname set to . Aug 13 03:46:23.038170 systemd[1]: Initializing machine ID from VM UUID. Aug 13 03:46:23.038184 systemd[1]: Queued start job for default target initrd.target. Aug 13 03:46:23.038202 systemd[1]: Started systemd-ask-password-console.path. Aug 13 03:46:23.038217 systemd[1]: Reached target cryptsetup.target. Aug 13 03:46:23.038230 systemd[1]: Reached target paths.target. Aug 13 03:46:23.038245 systemd[1]: Reached target slices.target. Aug 13 03:46:23.038258 systemd[1]: Reached target swap.target. Aug 13 03:46:23.038272 systemd[1]: Reached target timers.target. Aug 13 03:46:23.038287 systemd[1]: Listening on iscsid.socket. Aug 13 03:46:23.038301 systemd[1]: Listening on iscsiuio.socket. Aug 13 03:46:23.038320 systemd[1]: Listening on systemd-journald-audit.socket. Aug 13 03:46:23.038335 systemd[1]: Listening on systemd-journald-dev-log.socket. Aug 13 03:46:23.038349 systemd[1]: Listening on systemd-journald.socket. Aug 13 03:46:23.038363 systemd[1]: Listening on systemd-networkd.socket. Aug 13 03:46:23.038377 systemd[1]: Listening on systemd-udevd-control.socket. Aug 13 03:46:23.038396 systemd[1]: Listening on systemd-udevd-kernel.socket. Aug 13 03:46:23.038411 systemd[1]: Reached target sockets.target. Aug 13 03:46:23.038425 systemd[1]: Starting kmod-static-nodes.service... Aug 13 03:46:23.038440 systemd[1]: Finished network-cleanup.service. Aug 13 03:46:23.038459 systemd[1]: Starting systemd-fsck-usr.service... Aug 13 03:46:23.038473 systemd[1]: Starting systemd-journald.service... Aug 13 03:46:23.038488 systemd[1]: Starting systemd-modules-load.service... Aug 13 03:46:23.038502 systemd[1]: Starting systemd-resolved.service... Aug 13 03:46:23.038516 systemd[1]: Starting systemd-vconsole-setup.service... Aug 13 03:46:23.038530 systemd[1]: Finished kmod-static-nodes.service. Aug 13 03:46:23.038545 kernel: audit: type=1130 audit(1755056782.955:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.038559 systemd[1]: Finished systemd-fsck-usr.service. Aug 13 03:46:23.038574 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Aug 13 03:46:23.038624 systemd-journald[201]: Journal started Aug 13 03:46:23.038726 systemd-journald[201]: Runtime Journal (/run/log/journal/7ab11dd96b9c43c7a917c2c32a5c75b6) is 4.7M, max 38.1M, 33.3M free. Aug 13 03:46:22.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:22.957108 systemd-modules-load[202]: Inserted module 'overlay' Aug 13 03:46:23.068163 kernel: Bridge firewalling registered Aug 13 03:46:23.068228 systemd[1]: Started systemd-resolved.service. Aug 13 03:46:23.068255 kernel: audit: type=1130 audit(1755056783.059:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.009212 systemd-resolved[203]: Positive Trust Anchors: Aug 13 03:46:23.082774 systemd[1]: Started systemd-journald.service. Aug 13 03:46:23.082835 kernel: audit: type=1130 audit(1755056783.067:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.082859 kernel: SCSI subsystem initialized Aug 13 03:46:23.082889 kernel: audit: type=1130 audit(1755056783.076:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.009231 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Aug 13 03:46:23.009277 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Aug 13 03:46:23.096083 kernel: audit: type=1130 audit(1755056783.083:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.096130 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Aug 13 03:46:23.096151 kernel: device-mapper: uevent: version 1.0.3 Aug 13 03:46:23.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.017215 systemd-resolved[203]: Defaulting to hostname 'linux'. Aug 13 03:46:23.105057 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Aug 13 03:46:23.045555 systemd-modules-load[202]: Inserted module 'br_netfilter' Aug 13 03:46:23.078156 systemd[1]: Finished systemd-vconsole-setup.service. Aug 13 03:46:23.084409 systemd[1]: Reached target nss-lookup.target. Aug 13 03:46:23.090132 systemd[1]: Starting dracut-cmdline-ask.service... Aug 13 03:46:23.105452 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Aug 13 03:46:23.117186 systemd-modules-load[202]: Inserted module 'dm_multipath' Aug 13 03:46:23.118514 systemd[1]: Finished systemd-modules-load.service. Aug 13 03:46:23.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.125372 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Aug 13 03:46:23.132295 kernel: audit: type=1130 audit(1755056783.119:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.132337 kernel: audit: type=1130 audit(1755056783.125:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.133089 systemd[1]: Starting systemd-sysctl.service... Aug 13 03:46:23.136182 systemd[1]: Finished dracut-cmdline-ask.service. Aug 13 03:46:23.139095 systemd[1]: Starting dracut-cmdline.service... Aug 13 03:46:23.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.145949 kernel: audit: type=1130 audit(1755056783.136:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.148785 systemd[1]: Finished systemd-sysctl.service. Aug 13 03:46:23.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.156184 dracut-cmdline[222]: dracut-dracut-053 Aug 13 03:46:23.170663 kernel: audit: type=1130 audit(1755056783.150:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.170721 dracut-cmdline[222]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8f8aacd9fbcdd713563d390e899e90bedf5577e4b1b261b4e57687d87edd6b57 Aug 13 03:46:23.248962 kernel: Loading iSCSI transport class v2.0-870. Aug 13 03:46:23.270974 kernel: iscsi: registered transport (tcp) Aug 13 03:46:23.299488 kernel: iscsi: registered transport (qla4xxx) Aug 13 03:46:23.299570 kernel: QLogic iSCSI HBA Driver Aug 13 03:46:23.353061 systemd[1]: Finished dracut-cmdline.service. Aug 13 03:46:23.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.355881 systemd[1]: Starting dracut-pre-udev.service... Aug 13 03:46:23.416973 kernel: raid6: sse2x4 gen() 13577 MB/s Aug 13 03:46:23.434967 kernel: raid6: sse2x4 xor() 7571 MB/s Aug 13 03:46:23.452997 kernel: raid6: sse2x2 gen() 9626 MB/s Aug 13 03:46:23.470960 kernel: raid6: sse2x2 xor() 8034 MB/s Aug 13 03:46:23.488960 kernel: raid6: sse2x1 gen() 9855 MB/s Aug 13 03:46:23.508515 kernel: raid6: sse2x1 xor() 7067 MB/s Aug 13 03:46:23.508595 kernel: raid6: using algorithm sse2x4 gen() 13577 MB/s Aug 13 03:46:23.508626 kernel: raid6: .... xor() 7571 MB/s, rmw enabled Aug 13 03:46:23.508965 kernel: raid6: using ssse3x2 recovery algorithm Aug 13 03:46:23.526997 kernel: xor: automatically using best checksumming function avx Aug 13 03:46:23.642986 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Aug 13 03:46:23.656448 systemd[1]: Finished dracut-pre-udev.service. Aug 13 03:46:23.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.657000 audit: BPF prog-id=7 op=LOAD Aug 13 03:46:23.657000 audit: BPF prog-id=8 op=LOAD Aug 13 03:46:23.658720 systemd[1]: Starting systemd-udevd.service... Aug 13 03:46:23.676535 systemd-udevd[400]: Using default interface naming scheme 'v252'. Aug 13 03:46:23.685680 systemd[1]: Started systemd-udevd.service. Aug 13 03:46:23.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.691134 systemd[1]: Starting dracut-pre-trigger.service... Aug 13 03:46:23.710173 dracut-pre-trigger[410]: rd.md=0: removing MD RAID activation Aug 13 03:46:23.752105 systemd[1]: Finished dracut-pre-trigger.service. Aug 13 03:46:23.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.753842 systemd[1]: Starting systemd-udev-trigger.service... Aug 13 03:46:23.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:23.846525 systemd[1]: Finished systemd-udev-trigger.service. Aug 13 03:46:23.945961 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Aug 13 03:46:23.991943 kernel: cryptd: max_cpu_qlen set to 1000 Aug 13 03:46:23.991974 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Aug 13 03:46:23.991994 kernel: GPT:17805311 != 125829119 Aug 13 03:46:23.992011 kernel: GPT:Alternate GPT header not at the end of the disk. Aug 13 03:46:23.992028 kernel: GPT:17805311 != 125829119 Aug 13 03:46:23.992054 kernel: GPT: Use GNU Parted to correct GPT errors. Aug 13 03:46:23.992073 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Aug 13 03:46:23.997379 kernel: AVX version of gcm_enc/dec engaged. Aug 13 03:46:23.997420 kernel: AES CTR mode by8 optimization enabled Aug 13 03:46:24.035953 kernel: libata version 3.00 loaded. Aug 13 03:46:24.036592 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Aug 13 03:46:24.155486 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (446) Aug 13 03:46:24.155546 kernel: ACPI: bus type USB registered Aug 13 03:46:24.155567 kernel: usbcore: registered new interface driver usbfs Aug 13 03:46:24.155585 kernel: usbcore: registered new interface driver hub Aug 13 03:46:24.155616 kernel: usbcore: registered new device driver usb Aug 13 03:46:24.155636 kernel: ahci 0000:00:1f.2: version 3.0 Aug 13 03:46:24.155948 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Aug 13 03:46:24.155979 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Aug 13 03:46:24.156159 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Aug 13 03:46:24.156332 kernel: scsi host0: ahci Aug 13 03:46:24.156552 kernel: scsi host1: ahci Aug 13 03:46:24.156763 kernel: scsi host2: ahci Aug 13 03:46:24.156982 kernel: scsi host3: ahci Aug 13 03:46:24.157172 kernel: scsi host4: ahci Aug 13 03:46:24.157359 kernel: scsi host5: ahci Aug 13 03:46:24.157546 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Aug 13 03:46:24.157573 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Aug 13 03:46:24.157592 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Aug 13 03:46:24.157624 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Aug 13 03:46:24.157642 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Aug 13 03:46:24.157660 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Aug 13 03:46:24.154691 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Aug 13 03:46:24.161001 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Aug 13 03:46:24.169804 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Aug 13 03:46:24.175187 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Aug 13 03:46:24.178407 systemd[1]: Starting disk-uuid.service... Aug 13 03:46:24.189947 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Aug 13 03:46:24.192086 disk-uuid[527]: Primary Header is updated. Aug 13 03:46:24.192086 disk-uuid[527]: Secondary Entries is updated. Aug 13 03:46:24.192086 disk-uuid[527]: Secondary Header is updated. Aug 13 03:46:24.384046 kernel: ata1: SATA link down (SStatus 0 SControl 300) Aug 13 03:46:24.384157 kernel: ata2: SATA link down (SStatus 0 SControl 300) Aug 13 03:46:24.392964 kernel: ata3: SATA link down (SStatus 0 SControl 300) Aug 13 03:46:24.393036 kernel: ata4: SATA link down (SStatus 0 SControl 300) Aug 13 03:46:24.395865 kernel: ata5: SATA link down (SStatus 0 SControl 300) Aug 13 03:46:24.397952 kernel: ata6: SATA link down (SStatus 0 SControl 300) Aug 13 03:46:24.405954 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Aug 13 03:46:24.426702 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Aug 13 03:46:24.426917 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Aug 13 03:46:24.427130 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Aug 13 03:46:24.427325 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Aug 13 03:46:24.427514 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Aug 13 03:46:24.427716 kernel: hub 1-0:1.0: USB hub found Aug 13 03:46:24.427959 kernel: hub 1-0:1.0: 4 ports detected Aug 13 03:46:24.428163 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Aug 13 03:46:24.428373 kernel: hub 2-0:1.0: USB hub found Aug 13 03:46:24.428610 kernel: hub 2-0:1.0: 4 ports detected Aug 13 03:46:24.659982 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Aug 13 03:46:24.805351 kernel: hid: raw HID events driver (C) Jiri Kosina Aug 13 03:46:24.809237 kernel: usbcore: registered new interface driver usbhid Aug 13 03:46:24.809282 kernel: usbhid: USB HID core driver Aug 13 03:46:24.815969 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Aug 13 03:46:24.818954 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Aug 13 03:46:25.215663 disk-uuid[528]: The operation has completed successfully. Aug 13 03:46:25.216601 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Aug 13 03:46:25.281985 systemd[1]: disk-uuid.service: Deactivated successfully. Aug 13 03:46:25.283201 systemd[1]: Finished disk-uuid.service. Aug 13 03:46:25.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.298546 systemd[1]: Starting verity-setup.service... Aug 13 03:46:25.325079 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Aug 13 03:46:25.404407 systemd[1]: Found device dev-mapper-usr.device. Aug 13 03:46:25.406477 systemd[1]: Mounting sysusr-usr.mount... Aug 13 03:46:25.409258 systemd[1]: Finished verity-setup.service. Aug 13 03:46:25.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.505970 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Aug 13 03:46:25.506409 systemd[1]: Mounted sysusr-usr.mount. Aug 13 03:46:25.507257 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Aug 13 03:46:25.508318 systemd[1]: Starting ignition-setup.service... Aug 13 03:46:25.511072 systemd[1]: Starting parse-ip-for-networkd.service... Aug 13 03:46:25.529944 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Aug 13 03:46:25.530015 kernel: BTRFS info (device vda6): using free space tree Aug 13 03:46:25.530035 kernel: BTRFS info (device vda6): has skinny extents Aug 13 03:46:25.549752 systemd[1]: mnt-oem.mount: Deactivated successfully. Aug 13 03:46:25.558145 systemd[1]: Finished ignition-setup.service. Aug 13 03:46:25.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.560113 systemd[1]: Starting ignition-fetch-offline.service... Aug 13 03:46:25.660354 systemd[1]: Finished parse-ip-for-networkd.service. Aug 13 03:46:25.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.661000 audit: BPF prog-id=9 op=LOAD Aug 13 03:46:25.663442 systemd[1]: Starting systemd-networkd.service... Aug 13 03:46:25.695170 systemd-networkd[711]: lo: Link UP Aug 13 03:46:25.696257 systemd-networkd[711]: lo: Gained carrier Aug 13 03:46:25.697904 systemd-networkd[711]: Enumeration completed Aug 13 03:46:25.698808 systemd[1]: Started systemd-networkd.service. Aug 13 03:46:25.699880 systemd-networkd[711]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Aug 13 03:46:25.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.700561 systemd[1]: Reached target network.target. Aug 13 03:46:25.704000 systemd-networkd[711]: eth0: Link UP Aug 13 03:46:25.704607 systemd[1]: Starting iscsiuio.service... Aug 13 03:46:25.704716 systemd-networkd[711]: eth0: Gained carrier Aug 13 03:46:25.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.721205 systemd[1]: Started iscsiuio.service. Aug 13 03:46:25.724604 systemd[1]: Starting iscsid.service... Aug 13 03:46:25.730942 iscsid[716]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Aug 13 03:46:25.730942 iscsid[716]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Aug 13 03:46:25.730942 iscsid[716]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Aug 13 03:46:25.730942 iscsid[716]: If using hardware iscsi like qla4xxx this message can be ignored. Aug 13 03:46:25.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.740021 iscsid[716]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Aug 13 03:46:25.740021 iscsid[716]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Aug 13 03:46:25.734697 systemd[1]: Started iscsid.service. Aug 13 03:46:25.737394 systemd[1]: Starting dracut-initqueue.service... Aug 13 03:46:25.742065 systemd-networkd[711]: eth0: DHCPv4 address 10.244.16.30/30, gateway 10.244.16.29 acquired from 10.244.16.29 Aug 13 03:46:25.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.757654 systemd[1]: Finished dracut-initqueue.service. Aug 13 03:46:25.758503 systemd[1]: Reached target remote-fs-pre.target. Aug 13 03:46:25.759157 systemd[1]: Reached target remote-cryptsetup.target. Aug 13 03:46:25.759794 systemd[1]: Reached target remote-fs.target. Aug 13 03:46:25.762906 systemd[1]: Starting dracut-pre-mount.service... Aug 13 03:46:25.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.775884 systemd[1]: Finished dracut-pre-mount.service. Aug 13 03:46:25.778158 ignition[634]: Ignition 2.14.0 Aug 13 03:46:25.778185 ignition[634]: Stage: fetch-offline Aug 13 03:46:25.778302 ignition[634]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 03:46:25.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.781468 systemd[1]: Finished ignition-fetch-offline.service. Aug 13 03:46:25.778370 ignition[634]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Aug 13 03:46:25.783894 systemd[1]: Starting ignition-fetch.service... Aug 13 03:46:25.779971 ignition[634]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Aug 13 03:46:25.780158 ignition[634]: parsed url from cmdline: "" Aug 13 03:46:25.780166 ignition[634]: no config URL provided Aug 13 03:46:25.780177 ignition[634]: reading system config file "/usr/lib/ignition/user.ign" Aug 13 03:46:25.780194 ignition[634]: no config at "/usr/lib/ignition/user.ign" Aug 13 03:46:25.780202 ignition[634]: failed to fetch config: resource requires networking Aug 13 03:46:25.780567 ignition[634]: Ignition finished successfully Aug 13 03:46:25.800258 ignition[730]: Ignition 2.14.0 Aug 13 03:46:25.801043 ignition[730]: Stage: fetch Aug 13 03:46:25.801237 ignition[730]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 03:46:25.801273 ignition[730]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Aug 13 03:46:25.802649 ignition[730]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Aug 13 03:46:25.802784 ignition[730]: parsed url from cmdline: "" Aug 13 03:46:25.802792 ignition[730]: no config URL provided Aug 13 03:46:25.802802 ignition[730]: reading system config file "/usr/lib/ignition/user.ign" Aug 13 03:46:25.802818 ignition[730]: no config at "/usr/lib/ignition/user.ign" Aug 13 03:46:25.805649 ignition[730]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Aug 13 03:46:25.805882 ignition[730]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Aug 13 03:46:25.805920 ignition[730]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Aug 13 03:46:25.825963 ignition[730]: GET result: OK Aug 13 03:46:25.826297 ignition[730]: parsing config with SHA512: e8d78726cc93ee09b886d67db6f4a883030e750e1d4be03a0c1163ce03b9ab3eee0e7ce3f7d0da0939f2e2bc837c55a72ad5fabbf9808331177c2d98d268d466 Aug 13 03:46:25.834672 unknown[730]: fetched base config from "system" Aug 13 03:46:25.835535 unknown[730]: fetched base config from "system" Aug 13 03:46:25.836345 unknown[730]: fetched user config from "openstack" Aug 13 03:46:25.837606 ignition[730]: fetch: fetch complete Aug 13 03:46:25.838328 ignition[730]: fetch: fetch passed Aug 13 03:46:25.839151 ignition[730]: Ignition finished successfully Aug 13 03:46:25.841481 systemd[1]: Finished ignition-fetch.service. Aug 13 03:46:25.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.843530 systemd[1]: Starting ignition-kargs.service... Aug 13 03:46:25.856315 ignition[736]: Ignition 2.14.0 Aug 13 03:46:25.856334 ignition[736]: Stage: kargs Aug 13 03:46:25.856512 ignition[736]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 03:46:25.856548 ignition[736]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Aug 13 03:46:25.857820 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Aug 13 03:46:25.859778 ignition[736]: kargs: kargs passed Aug 13 03:46:25.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.860968 systemd[1]: Finished ignition-kargs.service. Aug 13 03:46:25.859850 ignition[736]: Ignition finished successfully Aug 13 03:46:25.862893 systemd[1]: Starting ignition-disks.service... Aug 13 03:46:25.873153 ignition[741]: Ignition 2.14.0 Aug 13 03:46:25.873173 ignition[741]: Stage: disks Aug 13 03:46:25.873347 ignition[741]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 03:46:25.873383 ignition[741]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Aug 13 03:46:25.874667 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Aug 13 03:46:25.876200 ignition[741]: disks: disks passed Aug 13 03:46:25.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.877395 systemd[1]: Finished ignition-disks.service. Aug 13 03:46:25.876268 ignition[741]: Ignition finished successfully Aug 13 03:46:25.878215 systemd[1]: Reached target initrd-root-device.target. Aug 13 03:46:25.879302 systemd[1]: Reached target local-fs-pre.target. Aug 13 03:46:25.880591 systemd[1]: Reached target local-fs.target. Aug 13 03:46:25.881848 systemd[1]: Reached target sysinit.target. Aug 13 03:46:25.883146 systemd[1]: Reached target basic.target. Aug 13 03:46:25.885697 systemd[1]: Starting systemd-fsck-root.service... Aug 13 03:46:25.905940 systemd-fsck[748]: ROOT: clean, 629/1628000 files, 124064/1617920 blocks Aug 13 03:46:25.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:25.909301 systemd[1]: Finished systemd-fsck-root.service. Aug 13 03:46:25.911160 systemd[1]: Mounting sysroot.mount... Aug 13 03:46:25.924992 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Aug 13 03:46:25.925956 systemd[1]: Mounted sysroot.mount. Aug 13 03:46:25.927427 systemd[1]: Reached target initrd-root-fs.target. Aug 13 03:46:25.930299 systemd[1]: Mounting sysroot-usr.mount... Aug 13 03:46:25.932327 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Aug 13 03:46:25.934375 systemd[1]: Starting flatcar-openstack-hostname.service... Aug 13 03:46:25.936103 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Aug 13 03:46:25.937425 systemd[1]: Reached target ignition-diskful.target. Aug 13 03:46:25.941974 systemd[1]: Mounted sysroot-usr.mount. Aug 13 03:46:25.945477 systemd[1]: Starting initrd-setup-root.service... Aug 13 03:46:25.956040 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Aug 13 03:46:25.968477 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Aug 13 03:46:25.977170 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Aug 13 03:46:25.988066 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory Aug 13 03:46:26.057147 systemd[1]: Finished initrd-setup-root.service. Aug 13 03:46:26.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:26.060204 systemd[1]: Starting ignition-mount.service... Aug 13 03:46:26.062853 systemd[1]: Starting sysroot-boot.service... Aug 13 03:46:26.074255 bash[802]: umount: /sysroot/usr/share/oem: not mounted. Aug 13 03:46:26.092460 ignition[804]: INFO : Ignition 2.14.0 Aug 13 03:46:26.094267 coreos-metadata[754]: Aug 13 03:46:26.094 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Aug 13 03:46:26.095575 ignition[804]: INFO : Stage: mount Aug 13 03:46:26.095575 ignition[804]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 03:46:26.095575 ignition[804]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Aug 13 03:46:26.098560 ignition[804]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Aug 13 03:46:26.098560 ignition[804]: INFO : mount: mount passed Aug 13 03:46:26.098560 ignition[804]: INFO : Ignition finished successfully Aug 13 03:46:26.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:26.099524 systemd[1]: Finished ignition-mount.service. Aug 13 03:46:26.108297 systemd[1]: Finished sysroot-boot.service. Aug 13 03:46:26.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:26.116210 coreos-metadata[754]: Aug 13 03:46:26.116 INFO Fetch successful Aug 13 03:46:26.117150 coreos-metadata[754]: Aug 13 03:46:26.116 INFO wrote hostname srv-amtey.gb1.brightbox.com to /sysroot/etc/hostname Aug 13 03:46:26.119841 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Aug 13 03:46:26.120011 systemd[1]: Finished flatcar-openstack-hostname.service. Aug 13 03:46:26.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:26.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:26.431514 systemd[1]: Mounting sysroot-usr-share-oem.mount... Aug 13 03:46:26.450962 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (811) Aug 13 03:46:26.454966 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Aug 13 03:46:26.455008 kernel: BTRFS info (device vda6): using free space tree Aug 13 03:46:26.455028 kernel: BTRFS info (device vda6): has skinny extents Aug 13 03:46:26.461783 systemd[1]: Mounted sysroot-usr-share-oem.mount. Aug 13 03:46:26.464788 systemd[1]: Starting ignition-files.service... Aug 13 03:46:26.487825 ignition[831]: INFO : Ignition 2.14.0 Aug 13 03:46:26.489020 ignition[831]: INFO : Stage: files Aug 13 03:46:26.489953 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 03:46:26.490976 ignition[831]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Aug 13 03:46:26.493895 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Aug 13 03:46:26.497532 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Aug 13 03:46:26.499387 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Aug 13 03:46:26.500475 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Aug 13 03:46:26.504964 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Aug 13 03:46:26.506277 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Aug 13 03:46:26.508417 unknown[831]: wrote ssh authorized keys file for user: core Aug 13 03:46:26.509492 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Aug 13 03:46:26.511322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Aug 13 03:46:26.512725 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Aug 13 03:46:26.701831 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Aug 13 03:46:27.015799 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Aug 13 03:46:27.017262 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Aug 13 03:46:27.017262 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Aug 13 03:46:27.017262 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Aug 13 03:46:27.017262 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Aug 13 03:46:27.017262 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Aug 13 03:46:27.017262 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Aug 13 03:46:27.017262 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Aug 13 03:46:27.017262 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Aug 13 03:46:27.026025 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Aug 13 03:46:27.026025 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Aug 13 03:46:27.026025 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Aug 13 03:46:27.026025 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Aug 13 03:46:27.026025 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Aug 13 03:46:27.026025 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Aug 13 03:46:27.072328 systemd-networkd[711]: eth0: Gained IPv6LL Aug 13 03:46:27.344195 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Aug 13 03:46:28.585350 systemd-networkd[711]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:407:24:19ff:fef4:101e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:407:24:19ff:fef4:101e/64 assigned by NDisc. Aug 13 03:46:28.585367 systemd-networkd[711]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Aug 13 03:46:30.456570 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Aug 13 03:46:30.458567 ignition[831]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Aug 13 03:46:30.474282 ignition[831]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Aug 13 03:46:30.474282 ignition[831]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Aug 13 03:46:30.474282 ignition[831]: INFO : files: files passed Aug 13 03:46:30.474282 ignition[831]: INFO : Ignition finished successfully Aug 13 03:46:30.490815 kernel: kauditd_printk_skb: 28 callbacks suppressed Aug 13 03:46:30.490850 kernel: audit: type=1130 audit(1755056790.475:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.473743 systemd[1]: Finished ignition-files.service. Aug 13 03:46:30.478565 systemd[1]: Starting initrd-setup-root-after-ignition.service... Aug 13 03:46:30.487850 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Aug 13 03:46:30.506898 kernel: audit: type=1130 audit(1755056790.494:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.506981 kernel: audit: type=1131 audit(1755056790.494:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.507121 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Aug 13 03:46:30.513716 kernel: audit: type=1130 audit(1755056790.506:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.489824 systemd[1]: Starting ignition-quench.service... Aug 13 03:46:30.494594 systemd[1]: ignition-quench.service: Deactivated successfully. Aug 13 03:46:30.494755 systemd[1]: Finished ignition-quench.service. Aug 13 03:46:30.496238 systemd[1]: Finished initrd-setup-root-after-ignition.service. Aug 13 03:46:30.507859 systemd[1]: Reached target ignition-complete.target. Aug 13 03:46:30.515566 systemd[1]: Starting initrd-parse-etc.service... Aug 13 03:46:30.536289 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Aug 13 03:46:30.536464 systemd[1]: Finished initrd-parse-etc.service. Aug 13 03:46:30.548047 kernel: audit: type=1130 audit(1755056790.537:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.548085 kernel: audit: type=1131 audit(1755056790.537:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.538168 systemd[1]: Reached target initrd-fs.target. Aug 13 03:46:30.548676 systemd[1]: Reached target initrd.target. Aug 13 03:46:30.549964 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Aug 13 03:46:30.551249 systemd[1]: Starting dracut-pre-pivot.service... Aug 13 03:46:30.567783 systemd[1]: Finished dracut-pre-pivot.service. Aug 13 03:46:30.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.569874 systemd[1]: Starting initrd-cleanup.service... Aug 13 03:46:30.575715 kernel: audit: type=1130 audit(1755056790.567:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.584415 systemd[1]: Stopped target nss-lookup.target. Aug 13 03:46:30.585239 systemd[1]: Stopped target remote-cryptsetup.target. Aug 13 03:46:30.586668 systemd[1]: Stopped target timers.target. Aug 13 03:46:30.587991 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Aug 13 03:46:30.609548 kernel: audit: type=1131 audit(1755056790.603:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.588175 systemd[1]: Stopped dracut-pre-pivot.service. Aug 13 03:46:30.604163 systemd[1]: Stopped target initrd.target. Aug 13 03:46:30.610285 systemd[1]: Stopped target basic.target. Aug 13 03:46:30.611623 systemd[1]: Stopped target ignition-complete.target. Aug 13 03:46:30.612872 systemd[1]: Stopped target ignition-diskful.target. Aug 13 03:46:30.614152 systemd[1]: Stopped target initrd-root-device.target. Aug 13 03:46:30.615563 systemd[1]: Stopped target remote-fs.target. Aug 13 03:46:30.617613 systemd[1]: Stopped target remote-fs-pre.target. Aug 13 03:46:30.619048 systemd[1]: Stopped target sysinit.target. Aug 13 03:46:30.619857 systemd[1]: Stopped target local-fs.target. Aug 13 03:46:30.621232 systemd[1]: Stopped target local-fs-pre.target. Aug 13 03:46:30.622532 systemd[1]: Stopped target swap.target. Aug 13 03:46:30.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.623781 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Aug 13 03:46:30.631552 kernel: audit: type=1131 audit(1755056790.624:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.624092 systemd[1]: Stopped dracut-pre-mount.service. Aug 13 03:46:30.625408 systemd[1]: Stopped target cryptsetup.target. Aug 13 03:46:30.639057 kernel: audit: type=1131 audit(1755056790.632:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.632238 systemd[1]: dracut-initqueue.service: Deactivated successfully. Aug 13 03:46:30.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.632391 systemd[1]: Stopped dracut-initqueue.service. Aug 13 03:46:30.633731 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Aug 13 03:46:30.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.633898 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Aug 13 03:46:30.640001 systemd[1]: ignition-files.service: Deactivated successfully. Aug 13 03:46:30.640236 systemd[1]: Stopped ignition-files.service. Aug 13 03:46:30.642655 systemd[1]: Stopping ignition-mount.service... Aug 13 03:46:30.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.644582 systemd[1]: Stopping sysroot-boot.service... Aug 13 03:46:30.661043 ignition[869]: INFO : Ignition 2.14.0 Aug 13 03:46:30.661043 ignition[869]: INFO : Stage: umount Aug 13 03:46:30.661043 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 03:46:30.661043 ignition[869]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Aug 13 03:46:30.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.654379 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Aug 13 03:46:30.669268 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Aug 13 03:46:30.669268 ignition[869]: INFO : umount: umount passed Aug 13 03:46:30.669268 ignition[869]: INFO : Ignition finished successfully Aug 13 03:46:30.654730 systemd[1]: Stopped systemd-udev-trigger.service. Aug 13 03:46:30.657614 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Aug 13 03:46:30.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.657788 systemd[1]: Stopped dracut-pre-trigger.service. Aug 13 03:46:30.663277 systemd[1]: initrd-cleanup.service: Deactivated successfully. Aug 13 03:46:30.663425 systemd[1]: Finished initrd-cleanup.service. Aug 13 03:46:30.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.669520 systemd[1]: ignition-mount.service: Deactivated successfully. Aug 13 03:46:30.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.669649 systemd[1]: Stopped ignition-mount.service. Aug 13 03:46:30.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.678401 systemd[1]: sysroot-boot.mount: Deactivated successfully. Aug 13 03:46:30.679641 systemd[1]: ignition-disks.service: Deactivated successfully. Aug 13 03:46:30.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.679724 systemd[1]: Stopped ignition-disks.service. Aug 13 03:46:30.680473 systemd[1]: ignition-kargs.service: Deactivated successfully. Aug 13 03:46:30.680550 systemd[1]: Stopped ignition-kargs.service. Aug 13 03:46:30.681720 systemd[1]: ignition-fetch.service: Deactivated successfully. Aug 13 03:46:30.681781 systemd[1]: Stopped ignition-fetch.service. Aug 13 03:46:30.683193 systemd[1]: Stopped target network.target. Aug 13 03:46:30.685311 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Aug 13 03:46:30.685414 systemd[1]: Stopped ignition-fetch-offline.service. Aug 13 03:46:30.686862 systemd[1]: Stopped target paths.target. Aug 13 03:46:30.688313 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Aug 13 03:46:30.693001 systemd[1]: Stopped systemd-ask-password-console.path. Aug 13 03:46:30.695177 systemd[1]: Stopped target slices.target. Aug 13 03:46:30.696449 systemd[1]: Stopped target sockets.target. Aug 13 03:46:30.698000 systemd[1]: iscsid.socket: Deactivated successfully. Aug 13 03:46:30.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.698051 systemd[1]: Closed iscsid.socket. Aug 13 03:46:30.699281 systemd[1]: iscsiuio.socket: Deactivated successfully. Aug 13 03:46:30.699330 systemd[1]: Closed iscsiuio.socket. Aug 13 03:46:30.700565 systemd[1]: ignition-setup.service: Deactivated successfully. Aug 13 03:46:30.700644 systemd[1]: Stopped ignition-setup.service. Aug 13 03:46:30.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.702088 systemd[1]: Stopping systemd-networkd.service... Aug 13 03:46:30.703912 systemd[1]: Stopping systemd-resolved.service... Aug 13 03:46:30.706987 systemd-networkd[711]: eth0: DHCPv6 lease lost Aug 13 03:46:30.712000 audit: BPF prog-id=9 op=UNLOAD Aug 13 03:46:30.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.708240 systemd[1]: systemd-networkd.service: Deactivated successfully. Aug 13 03:46:30.708395 systemd[1]: Stopped systemd-networkd.service. Aug 13 03:46:30.710543 systemd[1]: systemd-networkd.socket: Deactivated successfully. Aug 13 03:46:30.710599 systemd[1]: Closed systemd-networkd.socket. Aug 13 03:46:30.712814 systemd[1]: Stopping network-cleanup.service... Aug 13 03:46:30.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.715066 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Aug 13 03:46:30.715141 systemd[1]: Stopped parse-ip-for-networkd.service. Aug 13 03:46:30.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.715871 systemd[1]: systemd-sysctl.service: Deactivated successfully. Aug 13 03:46:30.715953 systemd[1]: Stopped systemd-sysctl.service. Aug 13 03:46:30.727000 audit: BPF prog-id=6 op=UNLOAD Aug 13 03:46:30.716694 systemd[1]: systemd-modules-load.service: Deactivated successfully. Aug 13 03:46:30.716784 systemd[1]: Stopped systemd-modules-load.service. Aug 13 03:46:30.717731 systemd[1]: Stopping systemd-udevd.service... Aug 13 03:46:30.720525 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Aug 13 03:46:30.721278 systemd[1]: systemd-resolved.service: Deactivated successfully. Aug 13 03:46:30.721437 systemd[1]: Stopped systemd-resolved.service. Aug 13 03:46:30.724787 systemd[1]: systemd-udevd.service: Deactivated successfully. Aug 13 03:46:30.725015 systemd[1]: Stopped systemd-udevd.service. Aug 13 03:46:30.727896 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Aug 13 03:46:30.728046 systemd[1]: Closed systemd-udevd-control.socket. Aug 13 03:46:30.731171 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Aug 13 03:46:30.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.731225 systemd[1]: Closed systemd-udevd-kernel.socket. Aug 13 03:46:30.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.732621 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Aug 13 03:46:30.732691 systemd[1]: Stopped dracut-pre-udev.service. Aug 13 03:46:30.740200 systemd[1]: dracut-cmdline.service: Deactivated successfully. Aug 13 03:46:30.740292 systemd[1]: Stopped dracut-cmdline.service. Aug 13 03:46:30.741660 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Aug 13 03:46:30.741723 systemd[1]: Stopped dracut-cmdline-ask.service. Aug 13 03:46:30.744312 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Aug 13 03:46:30.745048 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Aug 13 03:46:30.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.745156 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Aug 13 03:46:30.754210 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Aug 13 03:46:30.754293 systemd[1]: Stopped kmod-static-nodes.service. Aug 13 03:46:30.755720 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Aug 13 03:46:30.755791 systemd[1]: Stopped systemd-vconsole-setup.service. Aug 13 03:46:30.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.758870 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Aug 13 03:46:30.759713 systemd[1]: network-cleanup.service: Deactivated successfully. Aug 13 03:46:30.759854 systemd[1]: Stopped network-cleanup.service. Aug 13 03:46:30.761710 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Aug 13 03:46:30.761843 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Aug 13 03:46:30.837696 systemd[1]: sysroot-boot.service: Deactivated successfully. Aug 13 03:46:30.837876 systemd[1]: Stopped sysroot-boot.service. Aug 13 03:46:30.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.839578 systemd[1]: Reached target initrd-switch-root.target. Aug 13 03:46:30.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:30.840661 systemd[1]: initrd-setup-root.service: Deactivated successfully. Aug 13 03:46:30.840731 systemd[1]: Stopped initrd-setup-root.service. Aug 13 03:46:30.842402 systemd[1]: Starting initrd-switch-root.service... Aug 13 03:46:30.858871 systemd[1]: Switching root. Aug 13 03:46:30.884299 systemd-journald[201]: Journal stopped Aug 13 03:46:35.017127 systemd-journald[201]: Received SIGTERM from PID 1 (n/a). Aug 13 03:46:35.017220 kernel: SELinux: Class mctp_socket not defined in policy. Aug 13 03:46:35.017245 kernel: SELinux: Class anon_inode not defined in policy. Aug 13 03:46:35.017272 kernel: SELinux: the above unknown classes and permissions will be allowed Aug 13 03:46:35.017303 kernel: SELinux: policy capability network_peer_controls=1 Aug 13 03:46:35.017338 kernel: SELinux: policy capability open_perms=1 Aug 13 03:46:35.017359 kernel: SELinux: policy capability extended_socket_class=1 Aug 13 03:46:35.017380 kernel: SELinux: policy capability always_check_network=0 Aug 13 03:46:35.017405 kernel: SELinux: policy capability cgroup_seclabel=1 Aug 13 03:46:35.017436 kernel: SELinux: policy capability nnp_nosuid_transition=1 Aug 13 03:46:35.017464 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Aug 13 03:46:35.017484 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Aug 13 03:46:35.017506 systemd[1]: Successfully loaded SELinux policy in 73.474ms. Aug 13 03:46:35.017536 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.503ms. Aug 13 03:46:35.017571 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Aug 13 03:46:35.017595 systemd[1]: Detected virtualization kvm. Aug 13 03:46:35.017615 systemd[1]: Detected architecture x86-64. Aug 13 03:46:35.017636 systemd[1]: Detected first boot. Aug 13 03:46:35.017669 systemd[1]: Hostname set to . Aug 13 03:46:35.017702 systemd[1]: Initializing machine ID from VM UUID. Aug 13 03:46:35.017725 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Aug 13 03:46:35.017747 systemd[1]: Populated /etc with preset unit settings. Aug 13 03:46:35.017768 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 03:46:35.017797 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 03:46:35.017820 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 03:46:35.017854 systemd[1]: iscsiuio.service: Deactivated successfully. Aug 13 03:46:35.017884 systemd[1]: Stopped iscsiuio.service. Aug 13 03:46:35.017905 systemd[1]: iscsid.service: Deactivated successfully. Aug 13 03:46:35.018330 systemd[1]: Stopped iscsid.service. Aug 13 03:46:35.018364 systemd[1]: initrd-switch-root.service: Deactivated successfully. Aug 13 03:46:35.018385 systemd[1]: Stopped initrd-switch-root.service. Aug 13 03:46:35.018407 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Aug 13 03:46:35.018443 systemd[1]: Created slice system-addon\x2dconfig.slice. Aug 13 03:46:35.018482 systemd[1]: Created slice system-addon\x2drun.slice. Aug 13 03:46:35.018506 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Aug 13 03:46:35.018527 systemd[1]: Created slice system-getty.slice. Aug 13 03:46:35.018547 systemd[1]: Created slice system-modprobe.slice. Aug 13 03:46:35.018568 systemd[1]: Created slice system-serial\x2dgetty.slice. Aug 13 03:46:35.018589 systemd[1]: Created slice system-system\x2dcloudinit.slice. Aug 13 03:46:35.018609 systemd[1]: Created slice system-systemd\x2dfsck.slice. Aug 13 03:46:35.018660 systemd[1]: Created slice user.slice. Aug 13 03:46:35.018684 systemd[1]: Started systemd-ask-password-console.path. Aug 13 03:46:35.018711 systemd[1]: Started systemd-ask-password-wall.path. Aug 13 03:46:35.018745 systemd[1]: Set up automount boot.automount. Aug 13 03:46:35.018767 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Aug 13 03:46:35.018787 systemd[1]: Stopped target initrd-switch-root.target. Aug 13 03:46:35.018808 systemd[1]: Stopped target initrd-fs.target. Aug 13 03:46:35.018829 systemd[1]: Stopped target initrd-root-fs.target. Aug 13 03:46:35.018861 systemd[1]: Reached target integritysetup.target. Aug 13 03:46:35.018884 systemd[1]: Reached target remote-cryptsetup.target. Aug 13 03:46:35.018905 systemd[1]: Reached target remote-fs.target. Aug 13 03:46:35.018939 systemd[1]: Reached target slices.target. Aug 13 03:46:35.018962 systemd[1]: Reached target swap.target. Aug 13 03:46:35.018984 systemd[1]: Reached target torcx.target. Aug 13 03:46:35.019004 systemd[1]: Reached target veritysetup.target. Aug 13 03:46:35.019025 systemd[1]: Listening on systemd-coredump.socket. Aug 13 03:46:35.019046 systemd[1]: Listening on systemd-initctl.socket. Aug 13 03:46:35.019079 systemd[1]: Listening on systemd-networkd.socket. Aug 13 03:46:35.019102 systemd[1]: Listening on systemd-udevd-control.socket. Aug 13 03:46:35.019122 systemd[1]: Listening on systemd-udevd-kernel.socket. Aug 13 03:46:35.019143 systemd[1]: Listening on systemd-userdbd.socket. Aug 13 03:46:35.019179 systemd[1]: Mounting dev-hugepages.mount... Aug 13 03:46:35.019212 systemd[1]: Mounting dev-mqueue.mount... Aug 13 03:46:35.019233 systemd[1]: Mounting media.mount... Aug 13 03:46:35.019254 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:35.019273 systemd[1]: Mounting sys-kernel-debug.mount... Aug 13 03:46:35.019293 systemd[1]: Mounting sys-kernel-tracing.mount... Aug 13 03:46:35.019326 systemd[1]: Mounting tmp.mount... Aug 13 03:46:35.019366 systemd[1]: Starting flatcar-tmpfiles.service... Aug 13 03:46:35.019389 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 03:46:35.019410 systemd[1]: Starting kmod-static-nodes.service... Aug 13 03:46:35.019443 systemd[1]: Starting modprobe@configfs.service... Aug 13 03:46:35.019465 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 03:46:35.019486 systemd[1]: Starting modprobe@drm.service... Aug 13 03:46:35.019508 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 03:46:35.019529 systemd[1]: Starting modprobe@fuse.service... Aug 13 03:46:35.019562 systemd[1]: Starting modprobe@loop.service... Aug 13 03:46:35.019586 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Aug 13 03:46:35.019607 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Aug 13 03:46:35.019628 systemd[1]: Stopped systemd-fsck-root.service. Aug 13 03:46:35.019649 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Aug 13 03:46:35.019670 systemd[1]: Stopped systemd-fsck-usr.service. Aug 13 03:46:35.019706 systemd[1]: Stopped systemd-journald.service. Aug 13 03:46:35.019728 systemd[1]: Starting systemd-journald.service... Aug 13 03:46:35.019749 systemd[1]: Starting systemd-modules-load.service... Aug 13 03:46:35.019783 systemd[1]: Starting systemd-network-generator.service... Aug 13 03:46:35.019805 systemd[1]: Starting systemd-remount-fs.service... Aug 13 03:46:35.019827 systemd[1]: Starting systemd-udev-trigger.service... Aug 13 03:46:35.019847 kernel: loop: module loaded Aug 13 03:46:35.019868 systemd[1]: verity-setup.service: Deactivated successfully. Aug 13 03:46:35.019889 systemd[1]: Stopped verity-setup.service. Aug 13 03:46:35.019911 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:35.020684 kernel: fuse: init (API version 7.34) Aug 13 03:46:35.020714 systemd[1]: Mounted dev-hugepages.mount. Aug 13 03:46:35.020753 systemd[1]: Mounted dev-mqueue.mount. Aug 13 03:46:35.020776 systemd[1]: Mounted media.mount. Aug 13 03:46:35.020797 systemd[1]: Mounted sys-kernel-debug.mount. Aug 13 03:46:35.020819 systemd[1]: Mounted sys-kernel-tracing.mount. Aug 13 03:46:35.020839 systemd[1]: Mounted tmp.mount. Aug 13 03:46:35.020861 systemd[1]: Finished kmod-static-nodes.service. Aug 13 03:46:35.020893 systemd[1]: Finished flatcar-tmpfiles.service. Aug 13 03:46:35.020916 systemd[1]: modprobe@configfs.service: Deactivated successfully. Aug 13 03:46:35.022020 systemd[1]: Finished modprobe@configfs.service. Aug 13 03:46:35.022049 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 03:46:35.022071 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 03:46:35.022114 systemd-journald[983]: Journal started Aug 13 03:46:35.022201 systemd-journald[983]: Runtime Journal (/run/log/journal/7ab11dd96b9c43c7a917c2c32a5c75b6) is 4.7M, max 38.1M, 33.3M free. Aug 13 03:46:31.074000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Aug 13 03:46:31.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 03:46:31.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 03:46:31.150000 audit: BPF prog-id=10 op=LOAD Aug 13 03:46:31.150000 audit: BPF prog-id=10 op=UNLOAD Aug 13 03:46:31.150000 audit: BPF prog-id=11 op=LOAD Aug 13 03:46:31.150000 audit: BPF prog-id=11 op=UNLOAD Aug 13 03:46:31.275000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Aug 13 03:46:31.275000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:31.275000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Aug 13 03:46:31.279000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Aug 13 03:46:31.279000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:31.279000 audit: CWD cwd="/" Aug 13 03:46:31.279000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:31.279000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:31.279000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Aug 13 03:46:34.702000 audit: BPF prog-id=12 op=LOAD Aug 13 03:46:34.702000 audit: BPF prog-id=3 op=UNLOAD Aug 13 03:46:34.702000 audit: BPF prog-id=13 op=LOAD Aug 13 03:46:34.702000 audit: BPF prog-id=14 op=LOAD Aug 13 03:46:34.702000 audit: BPF prog-id=4 op=UNLOAD Aug 13 03:46:34.702000 audit: BPF prog-id=5 op=UNLOAD Aug 13 03:46:34.706000 audit: BPF prog-id=15 op=LOAD Aug 13 03:46:34.706000 audit: BPF prog-id=12 op=UNLOAD Aug 13 03:46:34.706000 audit: BPF prog-id=16 op=LOAD Aug 13 03:46:34.706000 audit: BPF prog-id=17 op=LOAD Aug 13 03:46:34.706000 audit: BPF prog-id=13 op=UNLOAD Aug 13 03:46:34.706000 audit: BPF prog-id=14 op=UNLOAD Aug 13 03:46:34.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:34.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:34.717000 audit: BPF prog-id=15 op=UNLOAD Aug 13 03:46:34.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:34.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:34.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:34.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:34.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:34.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:34.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:34.920000 audit: BPF prog-id=18 op=LOAD Aug 13 03:46:34.920000 audit: BPF prog-id=19 op=LOAD Aug 13 03:46:34.920000 audit: BPF prog-id=20 op=LOAD Aug 13 03:46:34.920000 audit: BPF prog-id=16 op=UNLOAD Aug 13 03:46:34.920000 audit: BPF prog-id=17 op=UNLOAD Aug 13 03:46:34.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.026313 systemd[1]: Started systemd-journald.service. Aug 13 03:46:35.005000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Aug 13 03:46:35.005000 audit[983]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffd09e6d0b0 a2=4000 a3=7ffd09e6d14c items=0 ppid=1 pid=983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:35.005000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Aug 13 03:46:35.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:31.272218 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 03:46:34.700173 systemd[1]: Queued start job for default target multi-user.target. Aug 13 03:46:35.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:31.272956 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Aug 13 03:46:34.700197 systemd[1]: Unnecessary job was removed for dev-vda6.device. Aug 13 03:46:31.273006 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Aug 13 03:46:34.709741 systemd[1]: systemd-journald.service: Deactivated successfully. Aug 13 03:46:31.273061 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Aug 13 03:46:35.026132 systemd[1]: modprobe@drm.service: Deactivated successfully. Aug 13 03:46:31.273080 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="skipped missing lower profile" missing profile=oem Aug 13 03:46:35.030115 systemd[1]: Finished modprobe@drm.service. Aug 13 03:46:31.273134 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Aug 13 03:46:35.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.031274 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 03:46:31.273156 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Aug 13 03:46:35.031482 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 03:46:31.273544 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Aug 13 03:46:35.032627 systemd[1]: modprobe@fuse.service: Deactivated successfully. Aug 13 03:46:31.273616 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Aug 13 03:46:35.032861 systemd[1]: Finished modprobe@fuse.service. Aug 13 03:46:31.273643 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Aug 13 03:46:35.034083 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 03:46:31.275376 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Aug 13 03:46:35.034329 systemd[1]: Finished modprobe@loop.service. Aug 13 03:46:31.275436 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Aug 13 03:46:35.035458 systemd[1]: Finished systemd-modules-load.service. Aug 13 03:46:31.275468 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Aug 13 03:46:35.036510 systemd[1]: Finished systemd-network-generator.service. Aug 13 03:46:31.275510 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Aug 13 03:46:35.039750 systemd[1]: Finished systemd-remount-fs.service. Aug 13 03:46:31.275543 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Aug 13 03:46:35.041089 systemd[1]: Reached target network-pre.target. Aug 13 03:46:31.275570 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Aug 13 03:46:35.045632 systemd[1]: Mounting sys-fs-fuse-connections.mount... Aug 13 03:46:34.094610 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 03:46:34.095115 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 03:46:34.095322 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 03:46:34.095695 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 03:46:34.095793 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Aug 13 03:46:34.095916 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-08-13T03:46:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Aug 13 03:46:35.050288 systemd[1]: Mounting sys-kernel-config.mount... Aug 13 03:46:35.051759 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Aug 13 03:46:35.055684 systemd[1]: Starting systemd-hwdb-update.service... Aug 13 03:46:35.058121 systemd[1]: Starting systemd-journal-flush.service... Aug 13 03:46:35.059571 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 03:46:35.061588 systemd[1]: Starting systemd-random-seed.service... Aug 13 03:46:35.063135 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 03:46:35.098047 systemd-journald[983]: Time spent on flushing to /var/log/journal/7ab11dd96b9c43c7a917c2c32a5c75b6 is 73.632ms for 1285 entries. Aug 13 03:46:35.098047 systemd-journald[983]: System Journal (/var/log/journal/7ab11dd96b9c43c7a917c2c32a5c75b6) is 8.0M, max 584.8M, 576.8M free. Aug 13 03:46:35.211975 systemd-journald[983]: Received client request to flush runtime journal. Aug 13 03:46:35.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.065533 systemd[1]: Starting systemd-sysctl.service... Aug 13 03:46:35.069166 systemd[1]: Starting systemd-sysusers.service... Aug 13 03:46:35.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.074986 systemd[1]: Mounted sys-fs-fuse-connections.mount. Aug 13 03:46:35.077508 systemd[1]: Mounted sys-kernel-config.mount. Aug 13 03:46:35.107148 systemd[1]: Finished systemd-random-seed.service. Aug 13 03:46:35.108251 systemd[1]: Reached target first-boot-complete.target. Aug 13 03:46:35.124975 systemd[1]: Finished systemd-sysctl.service. Aug 13 03:46:35.154290 systemd[1]: Finished systemd-sysusers.service. Aug 13 03:46:35.157336 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Aug 13 03:46:35.213303 systemd[1]: Finished systemd-journal-flush.service. Aug 13 03:46:35.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.227648 systemd[1]: Finished systemd-udev-trigger.service. Aug 13 03:46:35.230409 systemd[1]: Starting systemd-udev-settle.service... Aug 13 03:46:35.248187 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Aug 13 03:46:35.272313 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Aug 13 03:46:35.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.766539 kernel: kauditd_printk_skb: 102 callbacks suppressed Aug 13 03:46:35.766746 kernel: audit: type=1130 audit(1755056795.763:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.762381 systemd[1]: Finished systemd-hwdb-update.service. Aug 13 03:46:35.774886 kernel: audit: type=1334 audit(1755056795.770:143): prog-id=21 op=LOAD Aug 13 03:46:35.775011 kernel: audit: type=1334 audit(1755056795.772:144): prog-id=22 op=LOAD Aug 13 03:46:35.775061 kernel: audit: type=1334 audit(1755056795.772:145): prog-id=7 op=UNLOAD Aug 13 03:46:35.770000 audit: BPF prog-id=21 op=LOAD Aug 13 03:46:35.772000 audit: BPF prog-id=22 op=LOAD Aug 13 03:46:35.772000 audit: BPF prog-id=7 op=UNLOAD Aug 13 03:46:35.776681 kernel: audit: type=1334 audit(1755056795.772:146): prog-id=8 op=UNLOAD Aug 13 03:46:35.772000 audit: BPF prog-id=8 op=UNLOAD Aug 13 03:46:35.775544 systemd[1]: Starting systemd-udevd.service... Aug 13 03:46:35.803125 systemd-udevd[1015]: Using default interface naming scheme 'v252'. Aug 13 03:46:35.840679 systemd[1]: Started systemd-udevd.service. Aug 13 03:46:35.854040 kernel: audit: type=1130 audit(1755056795.840:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.851448 systemd[1]: Starting systemd-networkd.service... Aug 13 03:46:35.844000 audit: BPF prog-id=23 op=LOAD Aug 13 03:46:35.859024 kernel: audit: type=1334 audit(1755056795.844:148): prog-id=23 op=LOAD Aug 13 03:46:35.873355 kernel: audit: type=1334 audit(1755056795.865:149): prog-id=24 op=LOAD Aug 13 03:46:35.873497 kernel: audit: type=1334 audit(1755056795.866:150): prog-id=25 op=LOAD Aug 13 03:46:35.865000 audit: BPF prog-id=24 op=LOAD Aug 13 03:46:35.866000 audit: BPF prog-id=25 op=LOAD Aug 13 03:46:35.870191 systemd[1]: Starting systemd-userdbd.service... Aug 13 03:46:35.875639 kernel: audit: type=1334 audit(1755056795.866:151): prog-id=26 op=LOAD Aug 13 03:46:35.866000 audit: BPF prog-id=26 op=LOAD Aug 13 03:46:35.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:35.933777 systemd[1]: Started systemd-userdbd.service. Aug 13 03:46:35.964114 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Aug 13 03:46:36.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.055988 systemd-networkd[1026]: lo: Link UP Aug 13 03:46:36.056003 systemd-networkd[1026]: lo: Gained carrier Aug 13 03:46:36.056833 systemd-networkd[1026]: Enumeration completed Aug 13 03:46:36.057017 systemd[1]: Started systemd-networkd.service. Aug 13 03:46:36.060269 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Aug 13 03:46:36.060493 systemd-networkd[1026]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Aug 13 03:46:36.062905 systemd-networkd[1026]: eth0: Link UP Aug 13 03:46:36.063046 systemd-networkd[1026]: eth0: Gained carrier Aug 13 03:46:36.077178 systemd-networkd[1026]: eth0: DHCPv4 address 10.244.16.30/30, gateway 10.244.16.29 acquired from 10.244.16.29 Aug 13 03:46:36.093964 kernel: ACPI: button: Power Button [PWRF] Aug 13 03:46:36.124970 kernel: mousedev: PS/2 mouse device common for all mice Aug 13 03:46:36.130087 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Aug 13 03:46:36.192000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Aug 13 03:46:36.192000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d1c7595020 a1=338ac a2=7f7b65d52bc5 a3=5 items=110 ppid=1015 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:36.192000 audit: CWD cwd="/" Aug 13 03:46:36.192000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=1 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=2 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=3 name=(null) inode=14758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=4 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=5 name=(null) inode=14759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=6 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=7 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=8 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=9 name=(null) inode=14761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=10 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=11 name=(null) inode=14762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=12 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=13 name=(null) inode=14763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=14 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=15 name=(null) inode=14764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=16 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=17 name=(null) inode=14765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=18 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=19 name=(null) inode=14766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=20 name=(null) inode=14766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=21 name=(null) inode=14767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=22 name=(null) inode=14766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=23 name=(null) inode=14768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=24 name=(null) inode=14766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=25 name=(null) inode=14769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=26 name=(null) inode=14766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=27 name=(null) inode=14770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=28 name=(null) inode=14766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=29 name=(null) inode=14771 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=30 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=31 name=(null) inode=14772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=32 name=(null) inode=14772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=33 name=(null) inode=14773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=34 name=(null) inode=14772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=35 name=(null) inode=14774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=36 name=(null) inode=14772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=37 name=(null) inode=14775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=38 name=(null) inode=14772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=39 name=(null) inode=14776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=40 name=(null) inode=14772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=41 name=(null) inode=14777 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=42 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=43 name=(null) inode=14778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=44 name=(null) inode=14778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=45 name=(null) inode=14779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=46 name=(null) inode=14778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=47 name=(null) inode=14780 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=48 name=(null) inode=14778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=49 name=(null) inode=14781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=50 name=(null) inode=14778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=51 name=(null) inode=14782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=52 name=(null) inode=14778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=53 name=(null) inode=14783 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=55 name=(null) inode=14784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=56 name=(null) inode=14784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=57 name=(null) inode=14785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=58 name=(null) inode=14784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=59 name=(null) inode=14786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=60 name=(null) inode=14784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=61 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=62 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=63 name=(null) inode=14788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=64 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=65 name=(null) inode=14789 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=66 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=67 name=(null) inode=14790 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=68 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=69 name=(null) inode=14791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=70 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=71 name=(null) inode=14792 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=72 name=(null) inode=14784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=73 name=(null) inode=14793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=74 name=(null) inode=14793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=75 name=(null) inode=14794 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=76 name=(null) inode=14793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=77 name=(null) inode=14795 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=78 name=(null) inode=14793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=79 name=(null) inode=14796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=80 name=(null) inode=14793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=81 name=(null) inode=14797 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=82 name=(null) inode=14793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=83 name=(null) inode=14798 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=84 name=(null) inode=14784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=85 name=(null) inode=14799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=86 name=(null) inode=14799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=87 name=(null) inode=14800 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=88 name=(null) inode=14799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=89 name=(null) inode=14801 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=90 name=(null) inode=14799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=91 name=(null) inode=14802 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=92 name=(null) inode=14799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=93 name=(null) inode=14803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=94 name=(null) inode=14799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=95 name=(null) inode=14804 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=96 name=(null) inode=14784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=97 name=(null) inode=14805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=98 name=(null) inode=14805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=99 name=(null) inode=14806 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=100 name=(null) inode=14805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=101 name=(null) inode=14807 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=102 name=(null) inode=14805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=103 name=(null) inode=14808 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=104 name=(null) inode=14805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=105 name=(null) inode=14809 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=106 name=(null) inode=14805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=107 name=(null) inode=14810 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PATH item=109 name=(null) inode=14811 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:46:36.192000 audit: PROCTITLE proctitle="(udev-worker)" Aug 13 03:46:36.232309 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Aug 13 03:46:36.241710 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Aug 13 03:46:36.242109 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Aug 13 03:46:36.245950 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Aug 13 03:46:36.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.372958 systemd[1]: Finished systemd-udev-settle.service. Aug 13 03:46:36.375879 systemd[1]: Starting lvm2-activation-early.service... Aug 13 03:46:36.401885 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Aug 13 03:46:36.439713 systemd[1]: Finished lvm2-activation-early.service. Aug 13 03:46:36.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.440688 systemd[1]: Reached target cryptsetup.target. Aug 13 03:46:36.443278 systemd[1]: Starting lvm2-activation.service... Aug 13 03:46:36.450035 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Aug 13 03:46:36.477668 systemd[1]: Finished lvm2-activation.service. Aug 13 03:46:36.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.478628 systemd[1]: Reached target local-fs-pre.target. Aug 13 03:46:36.479327 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Aug 13 03:46:36.479380 systemd[1]: Reached target local-fs.target. Aug 13 03:46:36.480037 systemd[1]: Reached target machines.target. Aug 13 03:46:36.482847 systemd[1]: Starting ldconfig.service... Aug 13 03:46:36.484378 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 03:46:36.484458 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 03:46:36.486191 systemd[1]: Starting systemd-boot-update.service... Aug 13 03:46:36.489739 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Aug 13 03:46:36.496554 systemd[1]: Starting systemd-machine-id-commit.service... Aug 13 03:46:36.499258 systemd[1]: Starting systemd-sysext.service... Aug 13 03:46:36.508935 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1047 (bootctl) Aug 13 03:46:36.510855 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Aug 13 03:46:36.518880 systemd[1]: Unmounting usr-share-oem.mount... Aug 13 03:46:36.589706 systemd[1]: usr-share-oem.mount: Deactivated successfully. Aug 13 03:46:36.590002 systemd[1]: Unmounted usr-share-oem.mount. Aug 13 03:46:36.608321 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Aug 13 03:46:36.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.656048 kernel: loop0: detected capacity change from 0 to 221472 Aug 13 03:46:36.659350 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Aug 13 03:46:36.660246 systemd[1]: Finished systemd-machine-id-commit.service. Aug 13 03:46:36.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.703957 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Aug 13 03:46:36.725967 kernel: loop1: detected capacity change from 0 to 221472 Aug 13 03:46:36.743846 (sd-sysext)[1060]: Using extensions 'kubernetes'. Aug 13 03:46:36.746169 (sd-sysext)[1060]: Merged extensions into '/usr'. Aug 13 03:46:36.766996 systemd-fsck[1057]: fsck.fat 4.2 (2021-01-31) Aug 13 03:46:36.766996 systemd-fsck[1057]: /dev/vda1: 789 files, 119324/258078 clusters Aug 13 03:46:36.779358 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Aug 13 03:46:36.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.789880 systemd[1]: Mounting boot.mount... Aug 13 03:46:36.790562 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:36.797367 systemd[1]: Mounting usr-share-oem.mount... Aug 13 03:46:36.798340 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 03:46:36.800570 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 03:46:36.804753 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 03:46:36.809444 systemd[1]: Starting modprobe@loop.service... Aug 13 03:46:36.812507 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 03:46:36.812722 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 03:46:36.812933 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:36.819543 systemd[1]: Mounted boot.mount. Aug 13 03:46:36.821826 systemd[1]: Mounted usr-share-oem.mount. Aug 13 03:46:36.825479 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 03:46:36.825714 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 03:46:36.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.826876 systemd[1]: Finished systemd-sysext.service. Aug 13 03:46:36.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.828025 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 03:46:36.828208 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 03:46:36.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.829461 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 03:46:36.829646 systemd[1]: Finished modprobe@loop.service. Aug 13 03:46:36.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:36.835654 systemd[1]: Starting ensure-sysext.service... Aug 13 03:46:36.838486 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 03:46:36.838578 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 03:46:36.840215 systemd[1]: Starting systemd-tmpfiles-setup.service... Aug 13 03:46:36.850715 systemd[1]: Reloading. Aug 13 03:46:36.873881 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Aug 13 03:46:36.876606 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Aug 13 03:46:36.881257 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Aug 13 03:46:36.947416 /usr/lib/systemd/system-generators/torcx-generator[1088]: time="2025-08-13T03:46:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 03:46:36.947472 /usr/lib/systemd/system-generators/torcx-generator[1088]: time="2025-08-13T03:46:36Z" level=info msg="torcx already run" Aug 13 03:46:37.113399 ldconfig[1046]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Aug 13 03:46:37.121574 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 03:46:37.121606 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 03:46:37.150189 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 03:46:37.233000 audit: BPF prog-id=27 op=LOAD Aug 13 03:46:37.233000 audit: BPF prog-id=18 op=UNLOAD Aug 13 03:46:37.233000 audit: BPF prog-id=28 op=LOAD Aug 13 03:46:37.233000 audit: BPF prog-id=29 op=LOAD Aug 13 03:46:37.233000 audit: BPF prog-id=19 op=UNLOAD Aug 13 03:46:37.233000 audit: BPF prog-id=20 op=UNLOAD Aug 13 03:46:37.238000 audit: BPF prog-id=30 op=LOAD Aug 13 03:46:37.238000 audit: BPF prog-id=24 op=UNLOAD Aug 13 03:46:37.238000 audit: BPF prog-id=31 op=LOAD Aug 13 03:46:37.238000 audit: BPF prog-id=32 op=LOAD Aug 13 03:46:37.238000 audit: BPF prog-id=25 op=UNLOAD Aug 13 03:46:37.238000 audit: BPF prog-id=26 op=UNLOAD Aug 13 03:46:37.241000 audit: BPF prog-id=33 op=LOAD Aug 13 03:46:37.241000 audit: BPF prog-id=23 op=UNLOAD Aug 13 03:46:37.241000 audit: BPF prog-id=34 op=LOAD Aug 13 03:46:37.241000 audit: BPF prog-id=35 op=LOAD Aug 13 03:46:37.241000 audit: BPF prog-id=21 op=UNLOAD Aug 13 03:46:37.242000 audit: BPF prog-id=22 op=UNLOAD Aug 13 03:46:37.248464 systemd-networkd[1026]: eth0: Gained IPv6LL Aug 13 03:46:37.256969 systemd[1]: Finished ldconfig.service. Aug 13 03:46:37.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.258149 systemd[1]: Finished systemd-boot-update.service. Aug 13 03:46:37.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.261291 systemd[1]: Finished systemd-tmpfiles-setup.service. Aug 13 03:46:37.276779 systemd[1]: Starting audit-rules.service... Aug 13 03:46:37.279233 systemd[1]: Starting clean-ca-certificates.service... Aug 13 03:46:37.283059 systemd[1]: Starting systemd-journal-catalog-update.service... Aug 13 03:46:37.284000 audit: BPF prog-id=36 op=LOAD Aug 13 03:46:37.287259 systemd[1]: Starting systemd-resolved.service... Aug 13 03:46:37.292000 audit: BPF prog-id=37 op=LOAD Aug 13 03:46:37.294672 systemd[1]: Starting systemd-timesyncd.service... Aug 13 03:46:37.298619 systemd[1]: Starting systemd-update-utmp.service... Aug 13 03:46:37.301119 systemd[1]: Finished clean-ca-certificates.service. Aug 13 03:46:37.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.304000 audit[1141]: SYSTEM_BOOT pid=1141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.308749 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:37.309186 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.313488 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 03:46:37.319513 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 03:46:37.322582 systemd[1]: Starting modprobe@loop.service... Aug 13 03:46:37.323392 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.323699 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 03:46:37.324013 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Aug 13 03:46:37.324227 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:37.327901 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 03:46:37.328778 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 03:46:37.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.331334 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 03:46:37.331552 systemd[1]: Finished modprobe@loop.service. Aug 13 03:46:37.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.333042 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 03:46:37.333999 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 03:46:37.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.335501 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 03:46:37.335745 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.338109 systemd[1]: Finished systemd-update-utmp.service. Aug 13 03:46:37.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.341718 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:37.342703 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.345835 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 03:46:37.348331 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 03:46:37.353197 systemd[1]: Starting modprobe@loop.service... Aug 13 03:46:37.353976 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.354178 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 03:46:37.354418 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Aug 13 03:46:37.354604 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:37.356233 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 03:46:37.356480 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 03:46:37.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.358837 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 03:46:37.359088 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 03:46:37.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.362245 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 03:46:37.365640 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:37.366034 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.368693 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 03:46:37.371443 systemd[1]: Starting modprobe@drm.service... Aug 13 03:46:37.375013 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 03:46:37.376393 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.376628 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 03:46:37.379613 systemd[1]: Starting systemd-networkd-wait-online.service... Aug 13 03:46:37.383074 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Aug 13 03:46:37.383260 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 03:46:37.385172 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 03:46:37.385423 systemd[1]: Finished modprobe@loop.service. Aug 13 03:46:37.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.386751 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 03:46:37.386990 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 03:46:37.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.388241 systemd[1]: modprobe@drm.service: Deactivated successfully. Aug 13 03:46:37.388461 systemd[1]: Finished modprobe@drm.service. Aug 13 03:46:37.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.390046 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.394581 systemd[1]: Finished ensure-sysext.service. Aug 13 03:46:37.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.395850 systemd[1]: Finished systemd-journal-catalog-update.service. Aug 13 03:46:37.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.396989 systemd[1]: Finished systemd-networkd-wait-online.service. Aug 13 03:46:37.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.400338 systemd[1]: Starting systemd-update-done.service... Aug 13 03:46:37.413545 systemd[1]: Finished systemd-update-done.service. Aug 13 03:46:37.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.414973 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 03:46:37.415176 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 03:46:37.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:37.416328 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 03:46:37.447000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Aug 13 03:46:37.447000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa61b4070 a2=420 a3=0 items=0 ppid=1135 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:37.447000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Aug 13 03:46:37.449188 augenrules[1167]: No rules Aug 13 03:46:37.449197 systemd[1]: Finished audit-rules.service. Aug 13 03:46:37.466445 systemd[1]: Started systemd-timesyncd.service. Aug 13 03:46:37.467303 systemd[1]: Reached target time-set.target. Aug 13 03:46:37.471235 systemd-resolved[1139]: Positive Trust Anchors: Aug 13 03:46:37.471668 systemd-resolved[1139]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Aug 13 03:46:37.471826 systemd-resolved[1139]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Aug 13 03:46:37.479676 systemd-resolved[1139]: Using system hostname 'srv-amtey.gb1.brightbox.com'. Aug 13 03:46:37.482473 systemd[1]: Started systemd-resolved.service. Aug 13 03:46:37.483295 systemd[1]: Reached target network.target. Aug 13 03:46:37.483940 systemd[1]: Reached target network-online.target. Aug 13 03:46:37.484579 systemd[1]: Reached target nss-lookup.target. Aug 13 03:46:37.485224 systemd[1]: Reached target sysinit.target. Aug 13 03:46:37.485969 systemd[1]: Started motdgen.path. Aug 13 03:46:37.486608 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Aug 13 03:46:37.487614 systemd[1]: Started logrotate.timer. Aug 13 03:46:37.488409 systemd[1]: Started mdadm.timer. Aug 13 03:46:37.489006 systemd[1]: Started systemd-tmpfiles-clean.timer. Aug 13 03:46:37.489708 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Aug 13 03:46:37.489767 systemd[1]: Reached target paths.target. Aug 13 03:46:37.504852 systemd[1]: Reached target timers.target. Aug 13 03:46:37.506651 systemd[1]: Listening on dbus.socket. Aug 13 03:46:37.509050 systemd[1]: Starting docker.socket... Aug 13 03:46:37.514429 systemd[1]: Listening on sshd.socket. Aug 13 03:46:37.515224 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 03:46:37.515866 systemd[1]: Listening on docker.socket. Aug 13 03:46:37.516632 systemd[1]: Reached target sockets.target. Aug 13 03:46:37.517269 systemd[1]: Reached target basic.target. Aug 13 03:46:37.517955 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.518004 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Aug 13 03:46:37.520619 systemd[1]: Starting containerd.service... Aug 13 03:46:37.522879 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Aug 13 03:46:37.525451 systemd[1]: Starting dbus.service... Aug 13 03:46:37.528025 systemd[1]: Starting enable-oem-cloudinit.service... Aug 13 03:46:37.532692 systemd[1]: Starting extend-filesystems.service... Aug 13 03:46:37.542429 jq[1179]: false Aug 13 03:46:37.533577 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Aug 13 03:46:37.538591 systemd[1]: Starting kubelet.service... Aug 13 03:46:37.542355 systemd[1]: Starting motdgen.service... Aug 13 03:46:37.547678 systemd[1]: Starting prepare-helm.service... Aug 13 03:46:37.551604 systemd[1]: Starting ssh-key-proc-cmdline.service... Aug 13 03:46:37.557486 systemd[1]: Starting sshd-keygen.service... Aug 13 03:46:37.568521 systemd[1]: Starting systemd-logind.service... Aug 13 03:46:37.569335 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 03:46:37.569494 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Aug 13 03:46:37.570310 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Aug 13 03:46:37.605717 jq[1195]: true Aug 13 03:46:37.571634 systemd[1]: Starting update-engine.service... Aug 13 03:46:37.574249 systemd[1]: Starting update-ssh-keys-after-ignition.service... Aug 13 03:46:37.579052 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Aug 13 03:46:37.579390 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Aug 13 03:46:37.618673 jq[1200]: true Aug 13 03:46:37.612442 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Aug 13 03:46:37.612731 systemd[1]: Finished ssh-key-proc-cmdline.service. Aug 13 03:46:37.648504 tar[1199]: linux-amd64/helm Aug 13 03:46:37.663945 dbus-daemon[1177]: [system] SELinux support is enabled Aug 13 03:46:37.664652 systemd[1]: Started dbus.service. Aug 13 03:46:37.668005 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Aug 13 03:46:37.668063 systemd[1]: Reached target system-config.target. Aug 13 03:46:37.668749 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Aug 13 03:46:37.668792 systemd[1]: Reached target user-config.target. Aug 13 03:46:37.671235 systemd[1]: motdgen.service: Deactivated successfully. Aug 13 03:46:37.671507 systemd[1]: Finished motdgen.service. Aug 13 03:46:37.678991 extend-filesystems[1180]: Found loop1 Aug 13 03:46:37.678991 extend-filesystems[1180]: Found vda Aug 13 03:46:37.678991 extend-filesystems[1180]: Found vda1 Aug 13 03:46:37.683747 extend-filesystems[1180]: Found vda2 Aug 13 03:46:37.683747 extend-filesystems[1180]: Found vda3 Aug 13 03:46:37.683747 extend-filesystems[1180]: Found usr Aug 13 03:46:37.683747 extend-filesystems[1180]: Found vda4 Aug 13 03:46:37.683747 extend-filesystems[1180]: Found vda6 Aug 13 03:46:37.683747 extend-filesystems[1180]: Found vda7 Aug 13 03:46:37.683747 extend-filesystems[1180]: Found vda9 Aug 13 03:46:37.683747 extend-filesystems[1180]: Checking size of /dev/vda9 Aug 13 03:46:37.694311 dbus-daemon[1177]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1026 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Aug 13 03:46:37.714065 systemd[1]: Starting systemd-hostnamed.service... Aug 13 03:46:37.715368 systemd-timesyncd[1140]: Contacted time server 149.22.188.7:123 (0.flatcar.pool.ntp.org). Aug 13 03:46:37.715596 systemd-timesyncd[1140]: Initial clock synchronization to Wed 2025-08-13 03:46:37.749372 UTC. Aug 13 03:46:37.735521 extend-filesystems[1180]: Resized partition /dev/vda9 Aug 13 03:46:37.744019 extend-filesystems[1233]: resize2fs 1.46.5 (30-Dec-2021) Aug 13 03:46:37.756959 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Aug 13 03:46:37.760147 bash[1228]: Updated "/home/core/.ssh/authorized_keys" Aug 13 03:46:37.763642 systemd[1]: Finished update-ssh-keys-after-ignition.service. Aug 13 03:46:37.785960 update_engine[1194]: I0813 03:46:37.785246 1194 main.cc:92] Flatcar Update Engine starting Aug 13 03:46:37.790788 systemd[1]: Started update-engine.service. Aug 13 03:46:37.791149 update_engine[1194]: I0813 03:46:37.790867 1194 update_check_scheduler.cc:74] Next update check in 11m6s Aug 13 03:46:37.794167 systemd[1]: Started locksmithd.service. Aug 13 03:46:37.812831 systemd-logind[1192]: Watching system buttons on /dev/input/event2 (Power Button) Aug 13 03:46:37.812873 systemd-logind[1192]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Aug 13 03:46:37.815188 systemd-logind[1192]: New seat seat0. Aug 13 03:46:37.818369 systemd[1]: Started systemd-logind.service. Aug 13 03:46:37.952608 env[1201]: time="2025-08-13T03:46:37.952489682Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Aug 13 03:46:38.030959 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Aug 13 03:46:38.047006 env[1201]: time="2025-08-13T03:46:38.044156779Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Aug 13 03:46:38.047006 env[1201]: time="2025-08-13T03:46:38.046673593Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Aug 13 03:46:38.050511 extend-filesystems[1233]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Aug 13 03:46:38.050511 extend-filesystems[1233]: old_desc_blocks = 1, new_desc_blocks = 8 Aug 13 03:46:38.050511 extend-filesystems[1233]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Aug 13 03:46:38.057786 extend-filesystems[1180]: Resized filesystem in /dev/vda9 Aug 13 03:46:38.051010 systemd[1]: extend-filesystems.service: Deactivated successfully. Aug 13 03:46:38.060654 env[1201]: time="2025-08-13T03:46:38.060218837Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.189-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Aug 13 03:46:38.060654 env[1201]: time="2025-08-13T03:46:38.060266060Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Aug 13 03:46:38.060654 env[1201]: time="2025-08-13T03:46:38.060596758Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Aug 13 03:46:38.060654 env[1201]: time="2025-08-13T03:46:38.060625017Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Aug 13 03:46:38.060654 env[1201]: time="2025-08-13T03:46:38.060645400Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Aug 13 03:46:38.051282 systemd[1]: Finished extend-filesystems.service. Aug 13 03:46:38.061115 env[1201]: time="2025-08-13T03:46:38.060665218Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Aug 13 03:46:38.061115 env[1201]: time="2025-08-13T03:46:38.060791077Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Aug 13 03:46:38.062411 env[1201]: time="2025-08-13T03:46:38.061288366Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Aug 13 03:46:38.062411 env[1201]: time="2025-08-13T03:46:38.061474464Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Aug 13 03:46:38.062411 env[1201]: time="2025-08-13T03:46:38.061515412Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Aug 13 03:46:38.062411 env[1201]: time="2025-08-13T03:46:38.061605050Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Aug 13 03:46:38.062411 env[1201]: time="2025-08-13T03:46:38.061627633Z" level=info msg="metadata content store policy set" policy=shared Aug 13 03:46:38.066260 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.hostname1' Aug 13 03:46:38.066463 systemd[1]: Started systemd-hostnamed.service. Aug 13 03:46:38.067205 dbus-daemon[1177]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1230 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068033217Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068081492Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068105926Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068176786Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068204984Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068229182Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068251083Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068273367Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068303396Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068330821Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068351465Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068377185Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Aug 13 03:46:38.068740 env[1201]: time="2025-08-13T03:46:38.068546241Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Aug 13 03:46:38.072333 systemd[1]: Starting polkit.service... Aug 13 03:46:38.073962 env[1201]: time="2025-08-13T03:46:38.073498752Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Aug 13 03:46:38.073962 env[1201]: time="2025-08-13T03:46:38.073820296Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Aug 13 03:46:38.073962 env[1201]: time="2025-08-13T03:46:38.073880170Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.073962 env[1201]: time="2025-08-13T03:46:38.073907599Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Aug 13 03:46:38.074205 env[1201]: time="2025-08-13T03:46:38.074019543Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074205 env[1201]: time="2025-08-13T03:46:38.074048975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074205 env[1201]: time="2025-08-13T03:46:38.074077685Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074205 env[1201]: time="2025-08-13T03:46:38.074104053Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074205 env[1201]: time="2025-08-13T03:46:38.074125322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074205 env[1201]: time="2025-08-13T03:46:38.074147063Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074205 env[1201]: time="2025-08-13T03:46:38.074166581Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074205 env[1201]: time="2025-08-13T03:46:38.074185174Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074685 env[1201]: time="2025-08-13T03:46:38.074206428Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Aug 13 03:46:38.074685 env[1201]: time="2025-08-13T03:46:38.074412414Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074685 env[1201]: time="2025-08-13T03:46:38.074440257Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074685 env[1201]: time="2025-08-13T03:46:38.074468058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.074685 env[1201]: time="2025-08-13T03:46:38.074489013Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Aug 13 03:46:38.074685 env[1201]: time="2025-08-13T03:46:38.074511405Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Aug 13 03:46:38.074685 env[1201]: time="2025-08-13T03:46:38.074545152Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Aug 13 03:46:38.074685 env[1201]: time="2025-08-13T03:46:38.074607431Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Aug 13 03:46:38.075046 env[1201]: time="2025-08-13T03:46:38.074673831Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Aug 13 03:46:38.076513 env[1201]: time="2025-08-13T03:46:38.075102963Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Aug 13 03:46:38.076513 env[1201]: time="2025-08-13T03:46:38.075209501Z" level=info msg="Connect containerd service" Aug 13 03:46:38.076513 env[1201]: time="2025-08-13T03:46:38.075292590Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Aug 13 03:46:38.076513 env[1201]: time="2025-08-13T03:46:38.076106318Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Aug 13 03:46:38.080491 env[1201]: time="2025-08-13T03:46:38.076731657Z" level=info msg="Start subscribing containerd event" Aug 13 03:46:38.080491 env[1201]: time="2025-08-13T03:46:38.076802491Z" level=info msg="Start recovering state" Aug 13 03:46:38.080491 env[1201]: time="2025-08-13T03:46:38.076948804Z" level=info msg="Start event monitor" Aug 13 03:46:38.080491 env[1201]: time="2025-08-13T03:46:38.076977711Z" level=info msg="Start snapshots syncer" Aug 13 03:46:38.080491 env[1201]: time="2025-08-13T03:46:38.077002407Z" level=info msg="Start cni network conf syncer for default" Aug 13 03:46:38.080491 env[1201]: time="2025-08-13T03:46:38.077018637Z" level=info msg="Start streaming server" Aug 13 03:46:38.080491 env[1201]: time="2025-08-13T03:46:38.077317182Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Aug 13 03:46:38.080491 env[1201]: time="2025-08-13T03:46:38.077478399Z" level=info msg=serving... address=/run/containerd/containerd.sock Aug 13 03:46:38.101266 env[1201]: time="2025-08-13T03:46:38.099255238Z" level=info msg="containerd successfully booted in 0.156291s" Aug 13 03:46:38.099331 systemd[1]: Started containerd.service. Aug 13 03:46:38.115002 polkitd[1242]: Started polkitd version 121 Aug 13 03:46:38.142797 polkitd[1242]: Loading rules from directory /etc/polkit-1/rules.d Aug 13 03:46:38.143979 polkitd[1242]: Loading rules from directory /usr/share/polkit-1/rules.d Aug 13 03:46:38.148505 polkitd[1242]: Finished loading, compiling and executing 2 rules Aug 13 03:46:38.149403 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Aug 13 03:46:38.149622 systemd[1]: Started polkit.service. Aug 13 03:46:38.152191 polkitd[1242]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Aug 13 03:46:38.178761 systemd-hostnamed[1230]: Hostname set to (static) Aug 13 03:46:38.189039 systemd-networkd[1026]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:407:24:19ff:fef4:101e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:407:24:19ff:fef4:101e/64 assigned by NDisc. Aug 13 03:46:38.189054 systemd-networkd[1026]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Aug 13 03:46:38.732703 sshd_keygen[1207]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Aug 13 03:46:38.775863 systemd[1]: Finished sshd-keygen.service. Aug 13 03:46:38.785831 systemd[1]: Starting issuegen.service... Aug 13 03:46:38.802001 systemd[1]: issuegen.service: Deactivated successfully. Aug 13 03:46:38.802292 systemd[1]: Finished issuegen.service. Aug 13 03:46:38.806046 systemd[1]: Starting systemd-user-sessions.service... Aug 13 03:46:38.826395 systemd[1]: Finished systemd-user-sessions.service. Aug 13 03:46:38.829647 systemd[1]: Started getty@tty1.service. Aug 13 03:46:38.833730 systemd[1]: Started serial-getty@ttyS0.service. Aug 13 03:46:38.835484 systemd[1]: Reached target getty.target. Aug 13 03:46:38.850093 tar[1199]: linux-amd64/LICENSE Aug 13 03:46:38.850093 tar[1199]: linux-amd64/README.md Aug 13 03:46:38.858492 systemd[1]: Finished prepare-helm.service. Aug 13 03:46:38.911019 locksmithd[1234]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Aug 13 03:46:39.490562 systemd[1]: Started kubelet.service. Aug 13 03:46:40.188237 kubelet[1271]: E0813 03:46:40.188154 1271 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 03:46:40.191344 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 03:46:40.191582 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 03:46:40.192089 systemd[1]: kubelet.service: Consumed 1.156s CPU time. Aug 13 03:46:44.695643 coreos-metadata[1176]: Aug 13 03:46:44.695 WARN failed to locate config-drive, using the metadata service API instead Aug 13 03:46:44.754237 coreos-metadata[1176]: Aug 13 03:46:44.753 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Aug 13 03:46:44.781516 coreos-metadata[1176]: Aug 13 03:46:44.781 INFO Fetch successful Aug 13 03:46:44.781516 coreos-metadata[1176]: Aug 13 03:46:44.781 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Aug 13 03:46:44.822255 coreos-metadata[1176]: Aug 13 03:46:44.822 INFO Fetch successful Aug 13 03:46:44.825741 unknown[1176]: wrote ssh authorized keys file for user: core Aug 13 03:46:44.847804 update-ssh-keys[1280]: Updated "/home/core/.ssh/authorized_keys" Aug 13 03:46:44.849170 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Aug 13 03:46:44.849787 systemd[1]: Reached target multi-user.target. Aug 13 03:46:44.852562 systemd[1]: Starting systemd-update-utmp-runlevel.service... Aug 13 03:46:44.868507 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Aug 13 03:46:44.869087 systemd[1]: Finished systemd-update-utmp-runlevel.service. Aug 13 03:46:44.869877 systemd[1]: Startup finished in 1.158s (kernel) + 8.295s (initrd) + 13.880s (userspace) = 23.334s. Aug 13 03:46:47.497627 systemd[1]: Created slice system-sshd.slice. Aug 13 03:46:47.499590 systemd[1]: Started sshd@0-10.244.16.30:22-139.178.89.65:59718.service. Aug 13 03:46:48.423775 sshd[1283]: Accepted publickey for core from 139.178.89.65 port 59718 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:46:48.427003 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:46:48.444204 systemd[1]: Created slice user-500.slice. Aug 13 03:46:48.446356 systemd[1]: Starting user-runtime-dir@500.service... Aug 13 03:46:48.452157 systemd-logind[1192]: New session 1 of user core. Aug 13 03:46:48.465793 systemd[1]: Finished user-runtime-dir@500.service. Aug 13 03:46:48.468777 systemd[1]: Starting user@500.service... Aug 13 03:46:48.478068 (systemd)[1286]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:46:48.594430 systemd[1286]: Queued start job for default target default.target. Aug 13 03:46:48.595915 systemd[1286]: Reached target paths.target. Aug 13 03:46:48.595981 systemd[1286]: Reached target sockets.target. Aug 13 03:46:48.596006 systemd[1286]: Reached target timers.target. Aug 13 03:46:48.596027 systemd[1286]: Reached target basic.target. Aug 13 03:46:48.596103 systemd[1286]: Reached target default.target. Aug 13 03:46:48.596173 systemd[1286]: Startup finished in 106ms. Aug 13 03:46:48.596324 systemd[1]: Started user@500.service. Aug 13 03:46:48.598084 systemd[1]: Started session-1.scope. Aug 13 03:46:49.255256 systemd[1]: Started sshd@1-10.244.16.30:22-139.178.89.65:33338.service. Aug 13 03:46:50.210563 sshd[1295]: Accepted publickey for core from 139.178.89.65 port 33338 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:46:50.213257 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:46:50.214459 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Aug 13 03:46:50.214845 systemd[1]: Stopped kubelet.service. Aug 13 03:46:50.214908 systemd[1]: kubelet.service: Consumed 1.156s CPU time. Aug 13 03:46:50.216992 systemd[1]: Starting kubelet.service... Aug 13 03:46:50.224231 systemd[1]: Started session-2.scope. Aug 13 03:46:50.224918 systemd-logind[1192]: New session 2 of user core. Aug 13 03:46:50.387621 systemd[1]: Started kubelet.service. Aug 13 03:46:50.517488 kubelet[1302]: E0813 03:46:50.516914 1302 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 03:46:50.521284 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 03:46:50.521511 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 03:46:50.873792 sshd[1295]: pam_unix(sshd:session): session closed for user core Aug 13 03:46:50.877822 systemd[1]: sshd@1-10.244.16.30:22-139.178.89.65:33338.service: Deactivated successfully. Aug 13 03:46:50.878870 systemd[1]: session-2.scope: Deactivated successfully. Aug 13 03:46:50.879879 systemd-logind[1192]: Session 2 logged out. Waiting for processes to exit. Aug 13 03:46:50.881319 systemd-logind[1192]: Removed session 2. Aug 13 03:46:51.031275 systemd[1]: Started sshd@2-10.244.16.30:22-139.178.89.65:33346.service. Aug 13 03:46:51.979239 sshd[1311]: Accepted publickey for core from 139.178.89.65 port 33346 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:46:51.982308 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:46:51.990195 systemd-logind[1192]: New session 3 of user core. Aug 13 03:46:51.990600 systemd[1]: Started session-3.scope. Aug 13 03:46:52.635318 sshd[1311]: pam_unix(sshd:session): session closed for user core Aug 13 03:46:52.639103 systemd[1]: sshd@2-10.244.16.30:22-139.178.89.65:33346.service: Deactivated successfully. Aug 13 03:46:52.640232 systemd[1]: session-3.scope: Deactivated successfully. Aug 13 03:46:52.641182 systemd-logind[1192]: Session 3 logged out. Waiting for processes to exit. Aug 13 03:46:52.642690 systemd-logind[1192]: Removed session 3. Aug 13 03:46:52.796900 systemd[1]: Started sshd@3-10.244.16.30:22-139.178.89.65:33354.service. Aug 13 03:46:53.755062 sshd[1317]: Accepted publickey for core from 139.178.89.65 port 33354 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:46:53.758402 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:46:53.766753 systemd-logind[1192]: New session 4 of user core. Aug 13 03:46:53.767862 systemd[1]: Started session-4.scope. Aug 13 03:46:54.424191 sshd[1317]: pam_unix(sshd:session): session closed for user core Aug 13 03:46:54.429431 systemd-logind[1192]: Session 4 logged out. Waiting for processes to exit. Aug 13 03:46:54.429894 systemd[1]: sshd@3-10.244.16.30:22-139.178.89.65:33354.service: Deactivated successfully. Aug 13 03:46:54.431027 systemd[1]: session-4.scope: Deactivated successfully. Aug 13 03:46:54.432069 systemd-logind[1192]: Removed session 4. Aug 13 03:46:54.562995 systemd[1]: Started sshd@4-10.244.16.30:22-139.178.89.65:33362.service. Aug 13 03:46:55.454579 sshd[1323]: Accepted publickey for core from 139.178.89.65 port 33362 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:46:55.457370 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:46:55.464309 systemd[1]: Started session-5.scope. Aug 13 03:46:55.465290 systemd-logind[1192]: New session 5 of user core. Aug 13 03:46:55.951418 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Aug 13 03:46:55.951865 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 03:46:55.966284 dbus-daemon[1177]: \xd0=\x99\u0004WU: received setenforce notice (enforcing=-1867685808) Aug 13 03:46:55.968844 sudo[1326]: pam_unix(sudo:session): session closed for user root Aug 13 03:46:56.114899 sshd[1323]: pam_unix(sshd:session): session closed for user core Aug 13 03:46:56.119605 systemd[1]: sshd@4-10.244.16.30:22-139.178.89.65:33362.service: Deactivated successfully. Aug 13 03:46:56.120757 systemd[1]: session-5.scope: Deactivated successfully. Aug 13 03:46:56.121719 systemd-logind[1192]: Session 5 logged out. Waiting for processes to exit. Aug 13 03:46:56.123108 systemd-logind[1192]: Removed session 5. Aug 13 03:46:56.263139 systemd[1]: Started sshd@5-10.244.16.30:22-139.178.89.65:33364.service. Aug 13 03:46:57.156798 sshd[1330]: Accepted publickey for core from 139.178.89.65 port 33364 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:46:57.159464 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:46:57.166597 systemd[1]: Started session-6.scope. Aug 13 03:46:57.168013 systemd-logind[1192]: New session 6 of user core. Aug 13 03:46:57.637658 sudo[1334]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Aug 13 03:46:57.638700 sudo[1334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 03:46:57.643964 sudo[1334]: pam_unix(sudo:session): session closed for user root Aug 13 03:46:57.651912 sudo[1333]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Aug 13 03:46:57.652313 sudo[1333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 03:46:57.667091 systemd[1]: Stopping audit-rules.service... Aug 13 03:46:57.667000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Aug 13 03:46:57.670958 kernel: kauditd_printk_skb: 180 callbacks suppressed Aug 13 03:46:57.671097 kernel: audit: type=1305 audit(1755056817.667:217): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Aug 13 03:46:57.667000 audit[1337]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc623c8030 a2=420 a3=0 items=0 ppid=1 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:57.674506 auditctl[1337]: No rules Aug 13 03:46:57.681563 kernel: audit: type=1300 audit(1755056817.667:217): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc623c8030 a2=420 a3=0 items=0 ppid=1 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:57.675551 systemd[1]: audit-rules.service: Deactivated successfully. Aug 13 03:46:57.675943 systemd[1]: Stopped audit-rules.service. Aug 13 03:46:57.667000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Aug 13 03:46:57.682645 systemd[1]: Starting audit-rules.service... Aug 13 03:46:57.684166 kernel: audit: type=1327 audit(1755056817.667:217): proctitle=2F7362696E2F617564697463746C002D44 Aug 13 03:46:57.689776 kernel: audit: type=1131 audit(1755056817.673:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.711102 augenrules[1354]: No rules Aug 13 03:46:57.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.712526 systemd[1]: Finished audit-rules.service. Aug 13 03:46:57.713909 sudo[1333]: pam_unix(sudo:session): session closed for user root Aug 13 03:46:57.711000 audit[1333]: USER_END pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.726551 kernel: audit: type=1130 audit(1755056817.711:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.726728 kernel: audit: type=1106 audit(1755056817.711:220): pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.711000 audit[1333]: CRED_DISP pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.732521 kernel: audit: type=1104 audit(1755056817.711:221): pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.859275 sshd[1330]: pam_unix(sshd:session): session closed for user core Aug 13 03:46:57.859000 audit[1330]: USER_END pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:46:57.862547 systemd[1]: sshd@5-10.244.16.30:22-139.178.89.65:33364.service: Deactivated successfully. Aug 13 03:46:57.863532 systemd[1]: session-6.scope: Deactivated successfully. Aug 13 03:46:57.859000 audit[1330]: CRED_DISP pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:46:57.874883 kernel: audit: type=1106 audit(1755056817.859:222): pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:46:57.875023 kernel: audit: type=1104 audit(1755056817.859:223): pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:46:57.874960 systemd-logind[1192]: Session 6 logged out. Waiting for processes to exit. Aug 13 03:46:57.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.244.16.30:22-139.178.89.65:33364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.881964 kernel: audit: type=1131 audit(1755056817.859:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.244.16.30:22-139.178.89.65:33364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:57.881959 systemd-logind[1192]: Removed session 6. Aug 13 03:46:58.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.244.16.30:22-139.178.89.65:33368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:58.007012 systemd[1]: Started sshd@6-10.244.16.30:22-139.178.89.65:33368.service. Aug 13 03:46:58.898000 audit[1360]: USER_ACCT pid=1360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:46:58.899994 sshd[1360]: Accepted publickey for core from 139.178.89.65 port 33368 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:46:58.900000 audit[1360]: CRED_ACQ pid=1360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:46:58.900000 audit[1360]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4ea74040 a2=3 a3=0 items=0 ppid=1 pid=1360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:58.900000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:46:58.902776 sshd[1360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:46:58.910360 systemd-logind[1192]: New session 7 of user core. Aug 13 03:46:58.911536 systemd[1]: Started session-7.scope. Aug 13 03:46:58.920000 audit[1360]: USER_START pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:46:58.923000 audit[1362]: CRED_ACQ pid=1362 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:46:59.377000 audit[1363]: USER_ACCT pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:46:59.377000 audit[1363]: CRED_REFR pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:46:59.378106 sudo[1363]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Aug 13 03:46:59.378970 sudo[1363]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 03:46:59.381000 audit[1363]: USER_START pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:46:59.418130 systemd[1]: Starting docker.service... Aug 13 03:46:59.481639 env[1373]: time="2025-08-13T03:46:59.481513845Z" level=info msg="Starting up" Aug 13 03:46:59.483849 env[1373]: time="2025-08-13T03:46:59.483811896Z" level=info msg="parsed scheme: \"unix\"" module=grpc Aug 13 03:46:59.484620 env[1373]: time="2025-08-13T03:46:59.484589779Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Aug 13 03:46:59.484790 env[1373]: time="2025-08-13T03:46:59.484756964Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Aug 13 03:46:59.484910 env[1373]: time="2025-08-13T03:46:59.484880274Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Aug 13 03:46:59.489082 env[1373]: time="2025-08-13T03:46:59.488996572Z" level=info msg="parsed scheme: \"unix\"" module=grpc Aug 13 03:46:59.489392 env[1373]: time="2025-08-13T03:46:59.489362441Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Aug 13 03:46:59.489540 env[1373]: time="2025-08-13T03:46:59.489506826Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Aug 13 03:46:59.489739 env[1373]: time="2025-08-13T03:46:59.489631286Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Aug 13 03:46:59.503353 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3819449765-merged.mount: Deactivated successfully. Aug 13 03:46:59.529024 env[1373]: time="2025-08-13T03:46:59.528965305Z" level=info msg="Loading containers: start." Aug 13 03:46:59.623000 audit[1405]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.623000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc9c6f25f0 a2=0 a3=7ffc9c6f25dc items=0 ppid=1373 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.623000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Aug 13 03:46:59.627000 audit[1407]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.627000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe10653510 a2=0 a3=7ffe106534fc items=0 ppid=1373 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.627000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Aug 13 03:46:59.630000 audit[1409]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.630000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc3faf2ff0 a2=0 a3=7ffc3faf2fdc items=0 ppid=1373 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.630000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Aug 13 03:46:59.634000 audit[1411]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.634000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff06c41cc0 a2=0 a3=7fff06c41cac items=0 ppid=1373 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Aug 13 03:46:59.638000 audit[1413]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.638000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc40899280 a2=0 a3=7ffc4089926c items=0 ppid=1373 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Aug 13 03:46:59.660000 audit[1418]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.660000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc97e43d90 a2=0 a3=7ffc97e43d7c items=0 ppid=1373 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Aug 13 03:46:59.680000 audit[1420]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.680000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc301510f0 a2=0 a3=7ffc301510dc items=0 ppid=1373 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.680000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Aug 13 03:46:59.683000 audit[1422]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.683000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff60fd1b50 a2=0 a3=7fff60fd1b3c items=0 ppid=1373 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.683000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Aug 13 03:46:59.686000 audit[1424]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.686000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff3cc9e490 a2=0 a3=7fff3cc9e47c items=0 ppid=1373 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.686000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Aug 13 03:46:59.699000 audit[1428]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.699000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdabf74c70 a2=0 a3=7ffdabf74c5c items=0 ppid=1373 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.699000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Aug 13 03:46:59.704000 audit[1429]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.704000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff1c0e8710 a2=0 a3=7fff1c0e86fc items=0 ppid=1373 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.704000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Aug 13 03:46:59.721577 kernel: Initializing XFRM netlink socket Aug 13 03:46:59.771026 env[1373]: time="2025-08-13T03:46:59.770967680Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Aug 13 03:46:59.819000 audit[1437]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.819000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffda630ae10 a2=0 a3=7ffda630adfc items=0 ppid=1373 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.819000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Aug 13 03:46:59.833000 audit[1440]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.833000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe31b09110 a2=0 a3=7ffe31b090fc items=0 ppid=1373 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.833000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Aug 13 03:46:59.838000 audit[1443]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.838000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd19f1e8c0 a2=0 a3=7ffd19f1e8ac items=0 ppid=1373 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Aug 13 03:46:59.841000 audit[1445]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.841000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd2da1e370 a2=0 a3=7ffd2da1e35c items=0 ppid=1373 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.841000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Aug 13 03:46:59.845000 audit[1447]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.845000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc59b41590 a2=0 a3=7ffc59b4157c items=0 ppid=1373 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.845000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Aug 13 03:46:59.849000 audit[1450]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.849000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffca91b56e0 a2=0 a3=7ffca91b56cc items=0 ppid=1373 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.849000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Aug 13 03:46:59.852000 audit[1452]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.852000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdf0576160 a2=0 a3=7ffdf057614c items=0 ppid=1373 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.852000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Aug 13 03:46:59.876000 audit[1455]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.876000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffce28a890 a2=0 a3=7fffce28a87c items=0 ppid=1373 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Aug 13 03:46:59.879000 audit[1457]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.879000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe48cc36b0 a2=0 a3=7ffe48cc369c items=0 ppid=1373 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Aug 13 03:46:59.884000 audit[1459]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.884000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd3fff8ff0 a2=0 a3=7ffd3fff8fdc items=0 ppid=1373 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Aug 13 03:46:59.890000 audit[1461]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.890000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcad93ea10 a2=0 a3=7ffcad93e9fc items=0 ppid=1373 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.890000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Aug 13 03:46:59.892089 systemd-networkd[1026]: docker0: Link UP Aug 13 03:46:59.907000 audit[1465]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.907000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd32ea5640 a2=0 a3=7ffd32ea562c items=0 ppid=1373 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.907000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Aug 13 03:46:59.913000 audit[1466]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:46:59.913000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff384f9ce0 a2=0 a3=7fff384f9ccc items=0 ppid=1373 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:46:59.913000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Aug 13 03:46:59.915349 env[1373]: time="2025-08-13T03:46:59.915299423Z" level=info msg="Loading containers: done." Aug 13 03:46:59.945025 env[1373]: time="2025-08-13T03:46:59.944909693Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Aug 13 03:46:59.945406 env[1373]: time="2025-08-13T03:46:59.945366203Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Aug 13 03:46:59.945971 env[1373]: time="2025-08-13T03:46:59.945641844Z" level=info msg="Daemon has completed initialization" Aug 13 03:46:59.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:46:59.975128 systemd[1]: Started docker.service. Aug 13 03:46:59.986499 env[1373]: time="2025-08-13T03:46:59.986407875Z" level=info msg="API listen on /run/docker.sock" Aug 13 03:47:00.772973 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Aug 13 03:47:00.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:00.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:00.773890 systemd[1]: Stopped kubelet.service. Aug 13 03:47:00.778998 systemd[1]: Starting kubelet.service... Aug 13 03:47:00.809006 env[1201]: time="2025-08-13T03:47:00.808362348Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" Aug 13 03:47:01.037863 systemd[1]: Started kubelet.service. Aug 13 03:47:01.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:01.134854 kubelet[1504]: E0813 03:47:01.134727 1504 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 03:47:01.137026 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 03:47:01.137280 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 03:47:01.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Aug 13 03:47:01.888805 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3550975358.mount: Deactivated successfully. Aug 13 03:47:05.133914 env[1201]: time="2025-08-13T03:47:05.133778327Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:05.136506 env[1201]: time="2025-08-13T03:47:05.136462150Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:05.139058 env[1201]: time="2025-08-13T03:47:05.139017827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:05.141615 env[1201]: time="2025-08-13T03:47:05.141569828Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:05.143102 env[1201]: time="2025-08-13T03:47:05.142990246Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" Aug 13 03:47:05.144785 env[1201]: time="2025-08-13T03:47:05.144745023Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" Aug 13 03:47:08.233366 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Aug 13 03:47:08.247541 kernel: kauditd_printk_skb: 88 callbacks suppressed Aug 13 03:47:08.247758 kernel: audit: type=1131 audit(1755056828.232:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:08.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:08.256000 audit: BPF prog-id=43 op=UNLOAD Aug 13 03:47:08.256000 audit: BPF prog-id=42 op=UNLOAD Aug 13 03:47:08.260953 kernel: audit: type=1334 audit(1755056828.256:264): prog-id=43 op=UNLOAD Aug 13 03:47:08.261064 kernel: audit: type=1334 audit(1755056828.256:265): prog-id=42 op=UNLOAD Aug 13 03:47:08.261127 kernel: audit: type=1334 audit(1755056828.256:266): prog-id=41 op=UNLOAD Aug 13 03:47:08.256000 audit: BPF prog-id=41 op=UNLOAD Aug 13 03:47:08.378828 env[1201]: time="2025-08-13T03:47:08.378743371Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:08.382842 env[1201]: time="2025-08-13T03:47:08.382783003Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:08.400857 env[1201]: time="2025-08-13T03:47:08.400783517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:08.567280 env[1201]: time="2025-08-13T03:47:08.567070532Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:08.568212 env[1201]: time="2025-08-13T03:47:08.567587773Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" Aug 13 03:47:08.569000 env[1201]: time="2025-08-13T03:47:08.568961056Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" Aug 13 03:47:11.000835 env[1201]: time="2025-08-13T03:47:11.000754844Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:11.002878 env[1201]: time="2025-08-13T03:47:11.002840072Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:11.005660 env[1201]: time="2025-08-13T03:47:11.005601825Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:11.008380 env[1201]: time="2025-08-13T03:47:11.008336380Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:11.009785 env[1201]: time="2025-08-13T03:47:11.009731827Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" Aug 13 03:47:11.010552 env[1201]: time="2025-08-13T03:47:11.010510199Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" Aug 13 03:47:11.165539 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Aug 13 03:47:11.165888 systemd[1]: Stopped kubelet.service. Aug 13 03:47:11.178312 kernel: audit: type=1130 audit(1755056831.165:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:11.178456 kernel: audit: type=1131 audit(1755056831.165:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:11.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:11.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:11.170142 systemd[1]: Starting kubelet.service... Aug 13 03:47:11.343021 systemd[1]: Started kubelet.service. Aug 13 03:47:11.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:11.348982 kernel: audit: type=1130 audit(1755056831.342:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:11.408396 kubelet[1515]: E0813 03:47:11.408129 1515 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 03:47:11.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Aug 13 03:47:11.410703 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 03:47:11.410960 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 03:47:11.417984 kernel: audit: type=1131 audit(1755056831.410:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Aug 13 03:47:13.050241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3254045562.mount: Deactivated successfully. Aug 13 03:47:14.095386 env[1201]: time="2025-08-13T03:47:14.095315697Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:14.098139 env[1201]: time="2025-08-13T03:47:14.098099783Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:14.099791 env[1201]: time="2025-08-13T03:47:14.099746113Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:14.101586 env[1201]: time="2025-08-13T03:47:14.101544815Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:14.102534 env[1201]: time="2025-08-13T03:47:14.102481172Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" Aug 13 03:47:14.103438 env[1201]: time="2025-08-13T03:47:14.103400952Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Aug 13 03:47:15.082397 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2793670420.mount: Deactivated successfully. Aug 13 03:47:16.649034 env[1201]: time="2025-08-13T03:47:16.648418847Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:16.654132 env[1201]: time="2025-08-13T03:47:16.654063499Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:16.657053 env[1201]: time="2025-08-13T03:47:16.657010754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:16.660057 env[1201]: time="2025-08-13T03:47:16.660008077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:16.661359 env[1201]: time="2025-08-13T03:47:16.661309163Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Aug 13 03:47:16.662862 env[1201]: time="2025-08-13T03:47:16.662821626Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Aug 13 03:47:17.862332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1521358099.mount: Deactivated successfully. Aug 13 03:47:17.878861 env[1201]: time="2025-08-13T03:47:17.878768383Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:17.881399 env[1201]: time="2025-08-13T03:47:17.881357352Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:17.884045 env[1201]: time="2025-08-13T03:47:17.884004442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:17.886489 env[1201]: time="2025-08-13T03:47:17.886452401Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:17.887819 env[1201]: time="2025-08-13T03:47:17.887768511Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Aug 13 03:47:17.889712 env[1201]: time="2025-08-13T03:47:17.889677423Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Aug 13 03:47:19.439706 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2194558322.mount: Deactivated successfully. Aug 13 03:47:21.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:21.415330 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Aug 13 03:47:21.415613 systemd[1]: Stopped kubelet.service. Aug 13 03:47:21.424090 kernel: audit: type=1130 audit(1755056841.414:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:21.424113 systemd[1]: Starting kubelet.service... Aug 13 03:47:21.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:21.431997 kernel: audit: type=1131 audit(1755056841.414:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:21.630723 systemd[1]: Started kubelet.service. Aug 13 03:47:21.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:21.636954 kernel: audit: type=1130 audit(1755056841.630:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:21.765515 kubelet[1525]: E0813 03:47:21.765303 1525 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 03:47:21.768978 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 03:47:21.769204 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 03:47:21.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Aug 13 03:47:21.776954 kernel: audit: type=1131 audit(1755056841.768:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Aug 13 03:47:23.485898 env[1201]: time="2025-08-13T03:47:23.485806851Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:23.488543 env[1201]: time="2025-08-13T03:47:23.488498819Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:23.491373 env[1201]: time="2025-08-13T03:47:23.491331911Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:23.493878 env[1201]: time="2025-08-13T03:47:23.493838566Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:23.496320 env[1201]: time="2025-08-13T03:47:23.496272846Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Aug 13 03:47:23.550271 update_engine[1194]: I0813 03:47:23.550158 1194 update_attempter.cc:509] Updating boot flags... Aug 13 03:47:26.879314 systemd[1]: Stopped kubelet.service. Aug 13 03:47:26.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:26.888020 kernel: audit: type=1130 audit(1755056846.878:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:26.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:26.888467 systemd[1]: Starting kubelet.service... Aug 13 03:47:26.893982 kernel: audit: type=1131 audit(1755056846.882:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:26.933099 systemd[1]: Reloading. Aug 13 03:47:27.078217 /usr/lib/systemd/system-generators/torcx-generator[1589]: time="2025-08-13T03:47:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 03:47:27.078291 /usr/lib/systemd/system-generators/torcx-generator[1589]: time="2025-08-13T03:47:27Z" level=info msg="torcx already run" Aug 13 03:47:27.199604 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 03:47:27.199645 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 03:47:27.232343 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 03:47:27.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.337955 kernel: audit: type=1400 audit(1755056847.331:277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345957 kernel: audit: type=1400 audit(1755056847.331:278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362160 kernel: audit: type=1400 audit(1755056847.345:279): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362325 kernel: audit: type=1400 audit(1755056847.345:280): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.368728 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Aug 13 03:47:27.368908 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Aug 13 03:47:27.368984 kernel: audit: backlog limit exceeded Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374909 kernel: audit: type=1400 audit(1755056847.345:281): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit: BPF prog-id=46 op=LOAD Aug 13 03:47:27.345000 audit: BPF prog-id=27 op=UNLOAD Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit: BPF prog-id=47 op=LOAD Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.345000 audit: BPF prog-id=48 op=LOAD Aug 13 03:47:27.345000 audit: BPF prog-id=28 op=UNLOAD Aug 13 03:47:27.346000 audit: BPF prog-id=29 op=UNLOAD Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.350000 audit: BPF prog-id=49 op=LOAD Aug 13 03:47:27.350000 audit: BPF prog-id=36 op=UNLOAD Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.362000 audit: BPF prog-id=50 op=LOAD Aug 13 03:47:27.362000 audit: BPF prog-id=44 op=UNLOAD Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.364000 audit: BPF prog-id=51 op=LOAD Aug 13 03:47:27.364000 audit: BPF prog-id=30 op=UNLOAD Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit: BPF prog-id=52 op=LOAD Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.374000 audit: BPF prog-id=53 op=LOAD Aug 13 03:47:27.374000 audit: BPF prog-id=31 op=UNLOAD Aug 13 03:47:27.374000 audit: BPF prog-id=32 op=UNLOAD Aug 13 03:47:27.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit: BPF prog-id=54 op=LOAD Aug 13 03:47:27.379000 audit: BPF prog-id=38 op=UNLOAD Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit: BPF prog-id=55 op=LOAD Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.379000 audit: BPF prog-id=56 op=LOAD Aug 13 03:47:27.379000 audit: BPF prog-id=39 op=UNLOAD Aug 13 03:47:27.379000 audit: BPF prog-id=40 op=UNLOAD Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.380000 audit: BPF prog-id=57 op=LOAD Aug 13 03:47:27.381000 audit: BPF prog-id=33 op=UNLOAD Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit: BPF prog-id=58 op=LOAD Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.381000 audit: BPF prog-id=59 op=LOAD Aug 13 03:47:27.381000 audit: BPF prog-id=34 op=UNLOAD Aug 13 03:47:27.381000 audit: BPF prog-id=35 op=UNLOAD Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:27.385000 audit: BPF prog-id=60 op=LOAD Aug 13 03:47:27.385000 audit: BPF prog-id=37 op=UNLOAD Aug 13 03:47:27.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:27.415142 systemd[1]: Stopping kubelet.service... Aug 13 03:47:27.415696 systemd[1]: kubelet.service: Deactivated successfully. Aug 13 03:47:27.415996 systemd[1]: Stopped kubelet.service. Aug 13 03:47:27.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:27.419198 systemd[1]: Starting kubelet.service... Aug 13 03:47:27.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:27.565392 systemd[1]: Started kubelet.service. Aug 13 03:47:27.737048 kubelet[1643]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 03:47:27.737753 kubelet[1643]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Aug 13 03:47:27.737853 kubelet[1643]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 03:47:27.738217 kubelet[1643]: I0813 03:47:27.738150 1643 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Aug 13 03:47:28.306034 kubelet[1643]: I0813 03:47:28.305976 1643 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Aug 13 03:47:28.306262 kubelet[1643]: I0813 03:47:28.306237 1643 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Aug 13 03:47:28.306744 kubelet[1643]: I0813 03:47:28.306717 1643 server.go:934] "Client rotation is on, will bootstrap in background" Aug 13 03:47:28.343533 kubelet[1643]: E0813 03:47:28.343477 1643 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.244.16.30:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:28.347087 kubelet[1643]: I0813 03:47:28.345528 1643 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Aug 13 03:47:28.357215 kubelet[1643]: E0813 03:47:28.357167 1643 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Aug 13 03:47:28.357497 kubelet[1643]: I0813 03:47:28.357469 1643 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Aug 13 03:47:28.364655 kubelet[1643]: I0813 03:47:28.364618 1643 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Aug 13 03:47:28.365044 kubelet[1643]: I0813 03:47:28.365019 1643 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Aug 13 03:47:28.365453 kubelet[1643]: I0813 03:47:28.365387 1643 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Aug 13 03:47:28.365831 kubelet[1643]: I0813 03:47:28.365550 1643 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-amtey.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Aug 13 03:47:28.366191 kubelet[1643]: I0813 03:47:28.366165 1643 topology_manager.go:138] "Creating topology manager with none policy" Aug 13 03:47:28.366312 kubelet[1643]: I0813 03:47:28.366289 1643 container_manager_linux.go:300] "Creating device plugin manager" Aug 13 03:47:28.366616 kubelet[1643]: I0813 03:47:28.366593 1643 state_mem.go:36] "Initialized new in-memory state store" Aug 13 03:47:28.370344 kubelet[1643]: I0813 03:47:28.370314 1643 kubelet.go:408] "Attempting to sync node with API server" Aug 13 03:47:28.370588 kubelet[1643]: I0813 03:47:28.370562 1643 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Aug 13 03:47:28.370788 kubelet[1643]: I0813 03:47:28.370764 1643 kubelet.go:314] "Adding apiserver pod source" Aug 13 03:47:28.370961 kubelet[1643]: I0813 03:47:28.370937 1643 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Aug 13 03:47:28.382351 kubelet[1643]: I0813 03:47:28.382283 1643 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Aug 13 03:47:28.383735 kubelet[1643]: I0813 03:47:28.383690 1643 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Aug 13 03:47:28.383919 kubelet[1643]: W0813 03:47:28.383892 1643 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Aug 13 03:47:28.386484 kubelet[1643]: I0813 03:47:28.386444 1643 server.go:1274] "Started kubelet" Aug 13 03:47:28.387007 kubelet[1643]: W0813 03:47:28.386649 1643 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.16.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-amtey.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.16.30:6443: connect: connection refused Aug 13 03:47:28.387007 kubelet[1643]: E0813 03:47:28.386733 1643 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.244.16.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-amtey.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:28.392603 kubelet[1643]: W0813 03:47:28.392542 1643 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.16.30:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.244.16.30:6443: connect: connection refused Aug 13 03:47:28.393386 kubelet[1643]: E0813 03:47:28.393353 1643 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.244.16.30:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:28.393639 kubelet[1643]: I0813 03:47:28.393575 1643 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Aug 13 03:47:28.394977 kubelet[1643]: I0813 03:47:28.394865 1643 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Aug 13 03:47:28.395598 kubelet[1643]: I0813 03:47:28.395544 1643 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Aug 13 03:47:28.401363 kubelet[1643]: I0813 03:47:28.401328 1643 server.go:449] "Adding debug handlers to kubelet server" Aug 13 03:47:28.405000 audit[1643]: AVC avc: denied { mac_admin } for pid=1643 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:28.405000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 03:47:28.405000 audit[1643]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c54030 a1=c000a33848 a2=c000c54000 a3=25 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.405000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 03:47:28.408218 kubelet[1643]: I0813 03:47:28.408175 1643 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Aug 13 03:47:28.407000 audit[1643]: AVC avc: denied { mac_admin } for pid=1643 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:28.407000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 03:47:28.407000 audit[1643]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c364c0 a1=c000a33860 a2=c000c540c0 a3=25 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.407000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 03:47:28.408846 kubelet[1643]: I0813 03:47:28.408816 1643 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Aug 13 03:47:28.409122 kubelet[1643]: I0813 03:47:28.409097 1643 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Aug 13 03:47:28.410694 kubelet[1643]: E0813 03:47:28.403384 1643 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.16.30:6443/api/v1/namespaces/default/events\": dial tcp 10.244.16.30:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-amtey.gb1.brightbox.com.185b36e7a8b01390 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-amtey.gb1.brightbox.com,UID:srv-amtey.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-amtey.gb1.brightbox.com,},FirstTimestamp:2025-08-13 03:47:28.386397072 +0000 UTC m=+0.812848881,LastTimestamp:2025-08-13 03:47:28.386397072 +0000 UTC m=+0.812848881,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-amtey.gb1.brightbox.com,}" Aug 13 03:47:28.412573 kubelet[1643]: I0813 03:47:28.412135 1643 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Aug 13 03:47:28.416361 kubelet[1643]: I0813 03:47:28.416331 1643 volume_manager.go:289] "Starting Kubelet Volume Manager" Aug 13 03:47:28.416917 kubelet[1643]: E0813 03:47:28.416885 1643 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-amtey.gb1.brightbox.com\" not found" Aug 13 03:47:28.418009 kubelet[1643]: I0813 03:47:28.417983 1643 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Aug 13 03:47:28.418325 kubelet[1643]: I0813 03:47:28.418302 1643 reconciler.go:26] "Reconciler: start to sync state" Aug 13 03:47:28.419549 kubelet[1643]: W0813 03:47:28.418904 1643 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.16.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.16.30:6443: connect: connection refused Aug 13 03:47:28.419709 kubelet[1643]: E0813 03:47:28.419675 1643 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.244.16.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:28.419942 kubelet[1643]: E0813 03:47:28.419890 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.16.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-amtey.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.16.30:6443: connect: connection refused" interval="200ms" Aug 13 03:47:28.420332 kubelet[1643]: I0813 03:47:28.420303 1643 factory.go:221] Registration of the systemd container factory successfully Aug 13 03:47:28.420579 kubelet[1643]: I0813 03:47:28.420549 1643 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Aug 13 03:47:28.421000 audit[1654]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:28.421000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe785c6580 a2=0 a3=7ffe785c656c items=0 ppid=1643 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Aug 13 03:47:28.424208 kubelet[1643]: I0813 03:47:28.424182 1643 factory.go:221] Registration of the containerd container factory successfully Aug 13 03:47:28.424000 audit[1655]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:28.424000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff74ea55f0 a2=0 a3=7fff74ea55dc items=0 ppid=1643 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Aug 13 03:47:28.427000 audit[1657]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:28.427000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd2069a7f0 a2=0 a3=7ffd2069a7dc items=0 ppid=1643 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 03:47:28.429000 audit[1659]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:28.429000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe650b3790 a2=0 a3=7ffe650b377c items=0 ppid=1643 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 03:47:28.440432 kubelet[1643]: E0813 03:47:28.440361 1643 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Aug 13 03:47:28.454000 audit[1666]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:28.454000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffcb03af40 a2=0 a3=7fffcb03af2c items=0 ppid=1643 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Aug 13 03:47:28.456835 kubelet[1643]: I0813 03:47:28.456747 1643 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Aug 13 03:47:28.458000 audit[1668]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:28.458000 audit[1669]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:28.458000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff20741f20 a2=0 a3=7fff20741f0c items=0 ppid=1643 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Aug 13 03:47:28.458000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1b32c8f0 a2=0 a3=7ffe1b32c8dc items=0 ppid=1643 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Aug 13 03:47:28.460777 kubelet[1643]: I0813 03:47:28.460746 1643 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Aug 13 03:47:28.460866 kubelet[1643]: I0813 03:47:28.460800 1643 status_manager.go:217] "Starting to sync pod status with apiserver" Aug 13 03:47:28.460866 kubelet[1643]: I0813 03:47:28.460848 1643 kubelet.go:2321] "Starting kubelet main sync loop" Aug 13 03:47:28.461013 kubelet[1643]: E0813 03:47:28.460914 1643 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Aug 13 03:47:28.461000 audit[1672]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:28.461000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0ed1aac0 a2=0 a3=7fff0ed1aaac items=0 ppid=1643 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Aug 13 03:47:28.462000 audit[1673]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:28.462000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde907d060 a2=0 a3=7ffde907d04c items=0 ppid=1643 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.464137 kubelet[1643]: W0813 03:47:28.464008 1643 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.16.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.16.30:6443: connect: connection refused Aug 13 03:47:28.464137 kubelet[1643]: E0813 03:47:28.464052 1643 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.244.16.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:28.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Aug 13 03:47:28.464000 audit[1674]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:28.464000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd8185e50 a2=0 a3=7ffdd8185e3c items=0 ppid=1643 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Aug 13 03:47:28.466000 audit[1675]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:28.466000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdbadec510 a2=0 a3=7ffdbadec4fc items=0 ppid=1643 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Aug 13 03:47:28.472000 audit[1676]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:28.472000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe94f51fe0 a2=0 a3=7ffe94f51fcc items=0 ppid=1643 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.473873 kubelet[1643]: I0813 03:47:28.473842 1643 cpu_manager.go:214] "Starting CPU manager" policy="none" Aug 13 03:47:28.473873 kubelet[1643]: I0813 03:47:28.473868 1643 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Aug 13 03:47:28.474066 kubelet[1643]: I0813 03:47:28.473909 1643 state_mem.go:36] "Initialized new in-memory state store" Aug 13 03:47:28.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Aug 13 03:47:28.477581 kubelet[1643]: I0813 03:47:28.476990 1643 policy_none.go:49] "None policy: Start" Aug 13 03:47:28.478392 kubelet[1643]: I0813 03:47:28.478366 1643 memory_manager.go:170] "Starting memorymanager" policy="None" Aug 13 03:47:28.478565 kubelet[1643]: I0813 03:47:28.478541 1643 state_mem.go:35] "Initializing new in-memory state store" Aug 13 03:47:28.489349 systemd[1]: Created slice kubepods.slice. Aug 13 03:47:28.496892 systemd[1]: Created slice kubepods-burstable.slice. Aug 13 03:47:28.502767 systemd[1]: Created slice kubepods-besteffort.slice. Aug 13 03:47:28.511046 kubelet[1643]: I0813 03:47:28.510998 1643 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Aug 13 03:47:28.510000 audit[1643]: AVC avc: denied { mac_admin } for pid=1643 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:28.510000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 03:47:28.510000 audit[1643]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d52b70 a1=c000d653e0 a2=c000d52b40 a3=25 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:28.510000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 03:47:28.511646 kubelet[1643]: I0813 03:47:28.511146 1643 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Aug 13 03:47:28.513256 kubelet[1643]: I0813 03:47:28.513213 1643 eviction_manager.go:189] "Eviction manager: starting control loop" Aug 13 03:47:28.513355 kubelet[1643]: I0813 03:47:28.513253 1643 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Aug 13 03:47:28.513846 kubelet[1643]: I0813 03:47:28.513817 1643 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Aug 13 03:47:28.518154 kubelet[1643]: E0813 03:47:28.518118 1643 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-amtey.gb1.brightbox.com\" not found" Aug 13 03:47:28.577305 systemd[1]: Created slice kubepods-burstable-podd7a66ea3a4572f6144bce6b753a2c4ff.slice. Aug 13 03:47:28.595543 systemd[1]: Created slice kubepods-burstable-pod31c83f42c8597c216d3da4c3df0819c3.slice. Aug 13 03:47:28.602622 systemd[1]: Created slice kubepods-burstable-podfc88bf91528a055c101853167319923c.slice. Aug 13 03:47:28.617139 kubelet[1643]: I0813 03:47:28.617046 1643 kubelet_node_status.go:72] "Attempting to register node" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.617914 kubelet[1643]: E0813 03:47:28.617859 1643 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.16.30:6443/api/v1/nodes\": dial tcp 10.244.16.30:6443: connect: connection refused" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.620443 kubelet[1643]: E0813 03:47:28.620385 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.16.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-amtey.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.16.30:6443: connect: connection refused" interval="400ms" Aug 13 03:47:28.721534 kubelet[1643]: I0813 03:47:28.721442 1643 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fc88bf91528a055c101853167319923c-kubeconfig\") pod \"kube-scheduler-srv-amtey.gb1.brightbox.com\" (UID: \"fc88bf91528a055c101853167319923c\") " pod="kube-system/kube-scheduler-srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.721534 kubelet[1643]: I0813 03:47:28.721517 1643 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d7a66ea3a4572f6144bce6b753a2c4ff-k8s-certs\") pod \"kube-apiserver-srv-amtey.gb1.brightbox.com\" (UID: \"d7a66ea3a4572f6144bce6b753a2c4ff\") " pod="kube-system/kube-apiserver-srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.721857 kubelet[1643]: I0813 03:47:28.721565 1643 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-flexvolume-dir\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.721857 kubelet[1643]: I0813 03:47:28.721593 1643 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-k8s-certs\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.721857 kubelet[1643]: I0813 03:47:28.721626 1643 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.721857 kubelet[1643]: I0813 03:47:28.721685 1643 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d7a66ea3a4572f6144bce6b753a2c4ff-ca-certs\") pod \"kube-apiserver-srv-amtey.gb1.brightbox.com\" (UID: \"d7a66ea3a4572f6144bce6b753a2c4ff\") " pod="kube-system/kube-apiserver-srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.721857 kubelet[1643]: I0813 03:47:28.721719 1643 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d7a66ea3a4572f6144bce6b753a2c4ff-usr-share-ca-certificates\") pod \"kube-apiserver-srv-amtey.gb1.brightbox.com\" (UID: \"d7a66ea3a4572f6144bce6b753a2c4ff\") " pod="kube-system/kube-apiserver-srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.722181 kubelet[1643]: I0813 03:47:28.721746 1643 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-ca-certs\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.722181 kubelet[1643]: I0813 03:47:28.721772 1643 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-kubeconfig\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.821157 kubelet[1643]: I0813 03:47:28.821102 1643 kubelet_node_status.go:72] "Attempting to register node" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.823138 kubelet[1643]: E0813 03:47:28.823102 1643 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.16.30:6443/api/v1/nodes\": dial tcp 10.244.16.30:6443: connect: connection refused" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:28.900364 env[1201]: time="2025-08-13T03:47:28.898610390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-amtey.gb1.brightbox.com,Uid:d7a66ea3a4572f6144bce6b753a2c4ff,Namespace:kube-system,Attempt:0,}" Aug 13 03:47:28.905298 env[1201]: time="2025-08-13T03:47:28.904993168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-amtey.gb1.brightbox.com,Uid:31c83f42c8597c216d3da4c3df0819c3,Namespace:kube-system,Attempt:0,}" Aug 13 03:47:28.906128 env[1201]: time="2025-08-13T03:47:28.906083452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-amtey.gb1.brightbox.com,Uid:fc88bf91528a055c101853167319923c,Namespace:kube-system,Attempt:0,}" Aug 13 03:47:29.022315 kubelet[1643]: E0813 03:47:29.022181 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.16.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-amtey.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.16.30:6443: connect: connection refused" interval="800ms" Aug 13 03:47:29.227985 kubelet[1643]: I0813 03:47:29.227902 1643 kubelet_node_status.go:72] "Attempting to register node" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:29.228369 kubelet[1643]: E0813 03:47:29.228328 1643 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.16.30:6443/api/v1/nodes\": dial tcp 10.244.16.30:6443: connect: connection refused" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:29.452979 kubelet[1643]: W0813 03:47:29.452891 1643 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.16.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.16.30:6443: connect: connection refused Aug 13 03:47:29.453262 kubelet[1643]: E0813 03:47:29.453212 1643 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.244.16.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:29.723986 kubelet[1643]: W0813 03:47:29.723789 1643 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.16.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-amtey.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.16.30:6443: connect: connection refused Aug 13 03:47:29.723986 kubelet[1643]: E0813 03:47:29.723889 1643 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.244.16.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-amtey.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:29.751750 kubelet[1643]: W0813 03:47:29.751674 1643 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.16.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.16.30:6443: connect: connection refused Aug 13 03:47:29.751750 kubelet[1643]: E0813 03:47:29.751746 1643 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.244.16.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:29.824454 kubelet[1643]: E0813 03:47:29.824373 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.16.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-amtey.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.16.30:6443: connect: connection refused" interval="1.6s" Aug 13 03:47:29.913296 kubelet[1643]: W0813 03:47:29.913143 1643 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.16.30:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.244.16.30:6443: connect: connection refused Aug 13 03:47:29.913296 kubelet[1643]: E0813 03:47:29.913246 1643 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.244.16.30:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:30.033630 kubelet[1643]: I0813 03:47:30.032243 1643 kubelet_node_status.go:72] "Attempting to register node" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:30.033630 kubelet[1643]: E0813 03:47:30.032776 1643 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.16.30:6443/api/v1/nodes\": dial tcp 10.244.16.30:6443: connect: connection refused" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:30.152499 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount635869320.mount: Deactivated successfully. Aug 13 03:47:30.165598 env[1201]: time="2025-08-13T03:47:30.165485914Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.170858 env[1201]: time="2025-08-13T03:47:30.170808796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.172876 env[1201]: time="2025-08-13T03:47:30.172805271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.176090 env[1201]: time="2025-08-13T03:47:30.176055484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.179489 env[1201]: time="2025-08-13T03:47:30.179426859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.184863 env[1201]: time="2025-08-13T03:47:30.183334595Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.187908 env[1201]: time="2025-08-13T03:47:30.187844401Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.198314 env[1201]: time="2025-08-13T03:47:30.198249228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.199499 env[1201]: time="2025-08-13T03:47:30.199460931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.200700 env[1201]: time="2025-08-13T03:47:30.200665586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.201908 env[1201]: time="2025-08-13T03:47:30.201872974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.223599 env[1201]: time="2025-08-13T03:47:30.223517059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:30.228985 env[1201]: time="2025-08-13T03:47:30.228810013Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:47:30.229365 env[1201]: time="2025-08-13T03:47:30.228913934Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:47:30.229365 env[1201]: time="2025-08-13T03:47:30.229320500Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:47:30.230896 env[1201]: time="2025-08-13T03:47:30.230742326Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/980af973235cc3b96329af19cd7cb968c50108aff88a6bb56b6e401537d1b623 pid=1684 runtime=io.containerd.runc.v2 Aug 13 03:47:30.267304 env[1201]: time="2025-08-13T03:47:30.267197730Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:47:30.267626 env[1201]: time="2025-08-13T03:47:30.267306900Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:47:30.267626 env[1201]: time="2025-08-13T03:47:30.267357762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:47:30.267748 env[1201]: time="2025-08-13T03:47:30.267641889Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/91169313d08f2145877255f6c10d9f975b36e58de435d0f87a40b87772309416 pid=1711 runtime=io.containerd.runc.v2 Aug 13 03:47:30.269780 env[1201]: time="2025-08-13T03:47:30.269602695Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:47:30.269780 env[1201]: time="2025-08-13T03:47:30.269689113Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:47:30.269780 env[1201]: time="2025-08-13T03:47:30.269736722Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:47:30.270052 env[1201]: time="2025-08-13T03:47:30.269968765Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e51421c20d8e397c18656a0dcd3dbc8f7061f285b2b8c36a46eca7575cbcaa9 pid=1714 runtime=io.containerd.runc.v2 Aug 13 03:47:30.289990 systemd[1]: Started cri-containerd-980af973235cc3b96329af19cd7cb968c50108aff88a6bb56b6e401537d1b623.scope. Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.325000 audit: BPF prog-id=61 op=LOAD Aug 13 03:47:30.328000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.328000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1684 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938306166393733323335636333623936333239616631396364376362 Aug 13 03:47:30.328000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.328000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1684 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938306166393733323335636333623936333239616631396364376362 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.331000 audit: BPF prog-id=62 op=LOAD Aug 13 03:47:30.331000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002c7900 items=0 ppid=1684 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938306166393733323335636333623936333239616631396364376362 Aug 13 03:47:30.333000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.333000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.333000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.333000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.333000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.333000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.333000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.333000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.333000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.333000 audit: BPF prog-id=63 op=LOAD Aug 13 03:47:30.333000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002c7948 items=0 ppid=1684 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938306166393733323335636333623936333239616631396364376362 Aug 13 03:47:30.334000 audit: BPF prog-id=63 op=UNLOAD Aug 13 03:47:30.335000 audit: BPF prog-id=62 op=UNLOAD Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.335000 audit: BPF prog-id=64 op=LOAD Aug 13 03:47:30.335000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002c7d58 items=0 ppid=1684 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938306166393733323335636333623936333239616631396364376362 Aug 13 03:47:30.346492 systemd[1]: Started cri-containerd-2e51421c20d8e397c18656a0dcd3dbc8f7061f285b2b8c36a46eca7575cbcaa9.scope. Aug 13 03:47:30.374023 systemd[1]: Started cri-containerd-91169313d08f2145877255f6c10d9f975b36e58de435d0f87a40b87772309416.scope. Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.407000 audit: BPF prog-id=65 op=LOAD Aug 13 03:47:30.409000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.409000 audit[1735]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1714 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353134323163323064386533393763313836353661306463643364 Aug 13 03:47:30.409000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.409000 audit[1735]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1714 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353134323163323064386533393763313836353661306463643364 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit: BPF prog-id=66 op=LOAD Aug 13 03:47:30.412000 audit[1735]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003006d0 items=0 ppid=1714 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353134323163323064386533393763313836353661306463643364 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit: BPF prog-id=67 op=LOAD Aug 13 03:47:30.412000 audit[1735]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000300718 items=0 ppid=1714 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353134323163323064386533393763313836353661306463643364 Aug 13 03:47:30.412000 audit: BPF prog-id=67 op=UNLOAD Aug 13 03:47:30.412000 audit: BPF prog-id=66 op=UNLOAD Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { perfmon } for pid=1735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit[1735]: AVC avc: denied { bpf } for pid=1735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.412000 audit: BPF prog-id=68 op=LOAD Aug 13 03:47:30.412000 audit[1735]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000300b28 items=0 ppid=1714 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353134323163323064386533393763313836353661306463643364 Aug 13 03:47:30.428468 env[1201]: time="2025-08-13T03:47:30.428382313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-amtey.gb1.brightbox.com,Uid:d7a66ea3a4572f6144bce6b753a2c4ff,Namespace:kube-system,Attempt:0,} returns sandbox id \"980af973235cc3b96329af19cd7cb968c50108aff88a6bb56b6e401537d1b623\"" Aug 13 03:47:30.434568 env[1201]: time="2025-08-13T03:47:30.434205649Z" level=info msg="CreateContainer within sandbox \"980af973235cc3b96329af19cd7cb968c50108aff88a6bb56b6e401537d1b623\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Aug 13 03:47:30.451040 env[1201]: time="2025-08-13T03:47:30.450690933Z" level=info msg="CreateContainer within sandbox \"980af973235cc3b96329af19cd7cb968c50108aff88a6bb56b6e401537d1b623\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"06ae7ee66b000815a8efb1a326090411a2a51061243a01f7a4ab2d17c77d4d5a\"" Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.452000 audit: BPF prog-id=69 op=LOAD Aug 13 03:47:30.454341 env[1201]: time="2025-08-13T03:47:30.454023856Z" level=info msg="StartContainer for \"06ae7ee66b000815a8efb1a326090411a2a51061243a01f7a4ab2d17c77d4d5a\"" Aug 13 03:47:30.453000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.453000 audit[1728]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1711 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313639333133643038663231343538373732353566366331306439 Aug 13 03:47:30.455000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.455000 audit[1728]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1711 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313639333133643038663231343538373732353566366331306439 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.456000 audit: BPF prog-id=70 op=LOAD Aug 13 03:47:30.456000 audit[1728]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003681e0 items=0 ppid=1711 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313639333133643038663231343538373732353566366331306439 Aug 13 03:47:30.457000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.457000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.457000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.457000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.457000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.457000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.457000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.457000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.457000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.457000 audit: BPF prog-id=71 op=LOAD Aug 13 03:47:30.457000 audit[1728]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000368228 items=0 ppid=1711 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313639333133643038663231343538373732353566366331306439 Aug 13 03:47:30.460000 audit: BPF prog-id=71 op=UNLOAD Aug 13 03:47:30.460000 audit: BPF prog-id=70 op=UNLOAD Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.461000 audit: BPF prog-id=72 op=LOAD Aug 13 03:47:30.461000 audit[1728]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000368638 items=0 ppid=1711 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313639333133643038663231343538373732353566366331306439 Aug 13 03:47:30.494131 systemd[1]: Started cri-containerd-06ae7ee66b000815a8efb1a326090411a2a51061243a01f7a4ab2d17c77d4d5a.scope. Aug 13 03:47:30.512429 kubelet[1643]: E0813 03:47:30.512356 1643 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.244.16.30:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:30.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.531000 audit: BPF prog-id=73 op=LOAD Aug 13 03:47:30.532000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.532000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1684 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616537656536366230303038313561386566623161333236303930 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1684 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616537656536366230303038313561386566623161333236303930 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.536645 env[1201]: time="2025-08-13T03:47:30.534896939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-amtey.gb1.brightbox.com,Uid:31c83f42c8597c216d3da4c3df0819c3,Namespace:kube-system,Attempt:0,} returns sandbox id \"2e51421c20d8e397c18656a0dcd3dbc8f7061f285b2b8c36a46eca7575cbcaa9\"" Aug 13 03:47:30.534000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.534000 audit: BPF prog-id=74 op=LOAD Aug 13 03:47:30.534000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b8ba0 items=0 ppid=1684 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616537656536366230303038313561386566623161333236303930 Aug 13 03:47:30.537000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.537000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.537000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.537000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.537000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.537000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.537000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.537000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.537000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.537000 audit: BPF prog-id=75 op=LOAD Aug 13 03:47:30.542131 env[1201]: time="2025-08-13T03:47:30.542003973Z" level=info msg="CreateContainer within sandbox \"2e51421c20d8e397c18656a0dcd3dbc8f7061f285b2b8c36a46eca7575cbcaa9\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Aug 13 03:47:30.537000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b8be8 items=0 ppid=1684 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616537656536366230303038313561386566623161333236303930 Aug 13 03:47:30.549000 audit: BPF prog-id=75 op=UNLOAD Aug 13 03:47:30.549000 audit: BPF prog-id=74 op=UNLOAD Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.549000 audit: BPF prog-id=76 op=LOAD Aug 13 03:47:30.549000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8ff8 items=0 ppid=1684 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036616537656536366230303038313561386566623161333236303930 Aug 13 03:47:30.577204 env[1201]: time="2025-08-13T03:47:30.577121351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-amtey.gb1.brightbox.com,Uid:fc88bf91528a055c101853167319923c,Namespace:kube-system,Attempt:0,} returns sandbox id \"91169313d08f2145877255f6c10d9f975b36e58de435d0f87a40b87772309416\"" Aug 13 03:47:30.583087 env[1201]: time="2025-08-13T03:47:30.583025386Z" level=info msg="CreateContainer within sandbox \"91169313d08f2145877255f6c10d9f975b36e58de435d0f87a40b87772309416\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Aug 13 03:47:30.598682 env[1201]: time="2025-08-13T03:47:30.598596828Z" level=info msg="CreateContainer within sandbox \"2e51421c20d8e397c18656a0dcd3dbc8f7061f285b2b8c36a46eca7575cbcaa9\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a\"" Aug 13 03:47:30.600181 env[1201]: time="2025-08-13T03:47:30.600116163Z" level=info msg="StartContainer for \"00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a\"" Aug 13 03:47:30.610907 env[1201]: time="2025-08-13T03:47:30.610832883Z" level=info msg="CreateContainer within sandbox \"91169313d08f2145877255f6c10d9f975b36e58de435d0f87a40b87772309416\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459\"" Aug 13 03:47:30.612062 env[1201]: time="2025-08-13T03:47:30.611900973Z" level=info msg="StartContainer for \"06ae7ee66b000815a8efb1a326090411a2a51061243a01f7a4ab2d17c77d4d5a\" returns successfully" Aug 13 03:47:30.612589 env[1201]: time="2025-08-13T03:47:30.612538643Z" level=info msg="StartContainer for \"02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459\"" Aug 13 03:47:30.638603 systemd[1]: Started cri-containerd-00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a.scope. Aug 13 03:47:30.660606 systemd[1]: Started cri-containerd-02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459.scope. Aug 13 03:47:30.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.679000 audit: BPF prog-id=77 op=LOAD Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1714 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030333036656130623430363164356434666232613066333232633237 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1714 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030333036656130623430363164356434666232613066333232633237 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit: BPF prog-id=78 op=LOAD Aug 13 03:47:30.680000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d1bd0 items=0 ppid=1714 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030333036656130623430363164356434666232613066333232633237 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit: BPF prog-id=79 op=LOAD Aug 13 03:47:30.680000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d1c18 items=0 ppid=1714 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030333036656130623430363164356434666232613066333232633237 Aug 13 03:47:30.680000 audit: BPF prog-id=79 op=UNLOAD Aug 13 03:47:30.680000 audit: BPF prog-id=78 op=UNLOAD Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.680000 audit: BPF prog-id=80 op=LOAD Aug 13 03:47:30.680000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a2028 items=0 ppid=1714 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030333036656130623430363164356434666232613066333232633237 Aug 13 03:47:30.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.699000 audit: BPF prog-id=81 op=LOAD Aug 13 03:47:30.700000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.700000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1711 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032616539333464643533333637666335633734626164373239656539 Aug 13 03:47:30.701000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.701000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1711 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032616539333464643533333637666335633734626164373239656539 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.702000 audit: BPF prog-id=82 op=LOAD Aug 13 03:47:30.702000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000235f60 items=0 ppid=1711 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032616539333464643533333637666335633734626164373239656539 Aug 13 03:47:30.703000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.703000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.703000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.703000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.703000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.703000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.703000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.703000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.703000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.703000 audit: BPF prog-id=83 op=LOAD Aug 13 03:47:30.703000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000235fa8 items=0 ppid=1711 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032616539333464643533333637666335633734626164373239656539 Aug 13 03:47:30.704000 audit: BPF prog-id=83 op=UNLOAD Aug 13 03:47:30.705000 audit: BPF prog-id=82 op=UNLOAD Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:30.705000 audit: BPF prog-id=84 op=LOAD Aug 13 03:47:30.705000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003383b8 items=0 ppid=1711 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:30.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032616539333464643533333637666335633734626164373239656539 Aug 13 03:47:30.748776 env[1201]: time="2025-08-13T03:47:30.748688754Z" level=info msg="StartContainer for \"00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a\" returns successfully" Aug 13 03:47:30.780910 env[1201]: time="2025-08-13T03:47:30.780832633Z" level=info msg="StartContainer for \"02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459\" returns successfully" Aug 13 03:47:31.425454 kubelet[1643]: E0813 03:47:31.425390 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.16.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-amtey.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.16.30:6443: connect: connection refused" interval="3.2s" Aug 13 03:47:31.430625 kubelet[1643]: W0813 03:47:31.430552 1643 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.16.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.16.30:6443: connect: connection refused Aug 13 03:47:31.430811 kubelet[1643]: E0813 03:47:31.430778 1643 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.244.16.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.16.30:6443: connect: connection refused" logger="UnhandledError" Aug 13 03:47:31.557000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:31.557000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000354870 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:47:31.557000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:47:31.558000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:31.558000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000d800c0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:47:31.558000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:47:31.636406 kubelet[1643]: I0813 03:47:31.636361 1643 kubelet_node_status.go:72] "Attempting to register node" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:33.288000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.292306 kernel: kauditd_printk_skb: 565 callbacks suppressed Aug 13 03:47:33.292395 kernel: audit: type=1400 audit(1755056853.288:576): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.290000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.304639 kernel: audit: type=1400 audit(1755056853.290:577): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.290000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004b0e6c0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:47:33.317122 kernel: audit: type=1300 audit(1755056853.290:577): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004b0e6c0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:47:33.290000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:47:33.298000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.333815 kernel: audit: type=1327 audit(1755056853.290:577): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:47:33.334010 kernel: audit: type=1400 audit(1755056853.298:578): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.334069 kernel: audit: type=1300 audit(1755056853.298:578): arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004b0ea50 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:47:33.298000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004b0ea50 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:47:33.341962 kernel: audit: type=1327 audit(1755056853.298:578): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:47:33.298000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:47:33.301000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.354900 kernel: audit: type=1400 audit(1755056853.301:579): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.301000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004fc25a0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:47:33.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:47:33.378766 kernel: audit: type=1300 audit(1755056853.301:579): arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004fc25a0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:47:33.378905 kernel: audit: type=1327 audit(1755056853.301:579): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:47:33.288000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00493b9e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:47:33.288000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:47:33.437000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.437000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0055e8480 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:47:33.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:47:33.438000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:33.438000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00462d920 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:47:33.438000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:47:33.552326 kubelet[1643]: I0813 03:47:33.552185 1643 kubelet_node_status.go:75] "Successfully registered node" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:34.394613 kubelet[1643]: I0813 03:47:34.394539 1643 apiserver.go:52] "Watching apiserver" Aug 13 03:47:34.418893 kubelet[1643]: I0813 03:47:34.418814 1643 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Aug 13 03:47:36.149780 systemd[1]: Reloading. Aug 13 03:47:36.283755 /usr/lib/systemd/system-generators/torcx-generator[1931]: time="2025-08-13T03:47:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 03:47:36.284433 /usr/lib/systemd/system-generators/torcx-generator[1931]: time="2025-08-13T03:47:36Z" level=info msg="torcx already run" Aug 13 03:47:36.400905 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 03:47:36.401369 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 03:47:36.433610 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 03:47:36.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.567000 audit: BPF prog-id=85 op=LOAD Aug 13 03:47:36.567000 audit: BPF prog-id=81 op=UNLOAD Aug 13 03:47:36.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.569000 audit: BPF prog-id=86 op=LOAD Aug 13 03:47:36.570000 audit: BPF prog-id=46 op=UNLOAD Aug 13 03:47:36.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.571000 audit: BPF prog-id=87 op=LOAD Aug 13 03:47:36.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.572000 audit: BPF prog-id=88 op=LOAD Aug 13 03:47:36.572000 audit: BPF prog-id=47 op=UNLOAD Aug 13 03:47:36.572000 audit: BPF prog-id=48 op=UNLOAD Aug 13 03:47:36.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.576000 audit: BPF prog-id=89 op=LOAD Aug 13 03:47:36.576000 audit: BPF prog-id=61 op=UNLOAD Aug 13 03:47:36.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.579000 audit: BPF prog-id=90 op=LOAD Aug 13 03:47:36.579000 audit: BPF prog-id=73 op=UNLOAD Aug 13 03:47:36.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.583000 audit: BPF prog-id=91 op=LOAD Aug 13 03:47:36.583000 audit: BPF prog-id=77 op=UNLOAD Aug 13 03:47:36.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.589000 audit: BPF prog-id=92 op=LOAD Aug 13 03:47:36.591000 audit: BPF prog-id=49 op=UNLOAD Aug 13 03:47:36.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.596000 audit: BPF prog-id=93 op=LOAD Aug 13 03:47:36.597000 audit: BPF prog-id=50 op=UNLOAD Aug 13 03:47:36.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.605000 audit: BPF prog-id=94 op=LOAD Aug 13 03:47:36.605000 audit: BPF prog-id=51 op=UNLOAD Aug 13 03:47:36.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.609000 audit: BPF prog-id=95 op=LOAD Aug 13 03:47:36.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.610000 audit: BPF prog-id=96 op=LOAD Aug 13 03:47:36.610000 audit: BPF prog-id=52 op=UNLOAD Aug 13 03:47:36.610000 audit: BPF prog-id=53 op=UNLOAD Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.615000 audit: BPF prog-id=97 op=LOAD Aug 13 03:47:36.615000 audit: BPF prog-id=69 op=UNLOAD Aug 13 03:47:36.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit: BPF prog-id=98 op=LOAD Aug 13 03:47:36.618000 audit: BPF prog-id=54 op=UNLOAD Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit: BPF prog-id=99 op=LOAD Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.618000 audit: BPF prog-id=100 op=LOAD Aug 13 03:47:36.618000 audit: BPF prog-id=55 op=UNLOAD Aug 13 03:47:36.618000 audit: BPF prog-id=56 op=UNLOAD Aug 13 03:47:36.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.621000 audit: BPF prog-id=101 op=LOAD Aug 13 03:47:36.621000 audit: BPF prog-id=57 op=UNLOAD Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit: BPF prog-id=102 op=LOAD Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.622000 audit: BPF prog-id=103 op=LOAD Aug 13 03:47:36.622000 audit: BPF prog-id=58 op=UNLOAD Aug 13 03:47:36.622000 audit: BPF prog-id=59 op=UNLOAD Aug 13 03:47:36.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit: BPF prog-id=104 op=LOAD Aug 13 03:47:36.626000 audit: BPF prog-id=65 op=UNLOAD Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:36.626000 audit: BPF prog-id=105 op=LOAD Aug 13 03:47:36.626000 audit: BPF prog-id=60 op=UNLOAD Aug 13 03:47:36.685071 systemd[1]: Stopping kubelet.service... Aug 13 03:47:36.710642 systemd[1]: kubelet.service: Deactivated successfully. Aug 13 03:47:36.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:36.711115 systemd[1]: Stopped kubelet.service. Aug 13 03:47:36.711241 systemd[1]: kubelet.service: Consumed 1.268s CPU time. Aug 13 03:47:36.715279 systemd[1]: Starting kubelet.service... Aug 13 03:47:36.786000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Aug 13 03:47:36.786000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00091bc40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:47:36.786000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:47:38.221188 systemd[1]: Started kubelet.service. Aug 13 03:47:38.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:38.355651 kubelet[1983]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 03:47:38.355651 kubelet[1983]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Aug 13 03:47:38.355651 kubelet[1983]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 03:47:38.356546 kubelet[1983]: I0813 03:47:38.355742 1983 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Aug 13 03:47:38.381044 kubelet[1983]: I0813 03:47:38.380974 1983 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Aug 13 03:47:38.381438 kubelet[1983]: I0813 03:47:38.381413 1983 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Aug 13 03:47:38.382008 kubelet[1983]: I0813 03:47:38.381982 1983 server.go:934] "Client rotation is on, will bootstrap in background" Aug 13 03:47:38.384589 kubelet[1983]: I0813 03:47:38.384551 1983 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Aug 13 03:47:38.401796 kubelet[1983]: I0813 03:47:38.401733 1983 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Aug 13 03:47:38.427025 kubelet[1983]: E0813 03:47:38.426871 1983 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Aug 13 03:47:38.427420 kubelet[1983]: I0813 03:47:38.427391 1983 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Aug 13 03:47:38.434755 kubelet[1983]: I0813 03:47:38.433327 1983 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Aug 13 03:47:38.436534 kubelet[1983]: I0813 03:47:38.436505 1983 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Aug 13 03:47:38.438158 kubelet[1983]: I0813 03:47:38.438096 1983 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Aug 13 03:47:38.438583 kubelet[1983]: I0813 03:47:38.438296 1983 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-amtey.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Aug 13 03:47:38.438858 kubelet[1983]: I0813 03:47:38.438831 1983 topology_manager.go:138] "Creating topology manager with none policy" Aug 13 03:47:38.439015 kubelet[1983]: I0813 03:47:38.438992 1983 container_manager_linux.go:300] "Creating device plugin manager" Aug 13 03:47:38.439202 kubelet[1983]: I0813 03:47:38.439161 1983 state_mem.go:36] "Initialized new in-memory state store" Aug 13 03:47:38.440734 kubelet[1983]: I0813 03:47:38.440709 1983 kubelet.go:408] "Attempting to sync node with API server" Aug 13 03:47:38.442318 kubelet[1983]: I0813 03:47:38.442292 1983 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Aug 13 03:47:38.443633 kubelet[1983]: I0813 03:47:38.443608 1983 kubelet.go:314] "Adding apiserver pod source" Aug 13 03:47:38.443778 kubelet[1983]: I0813 03:47:38.443754 1983 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Aug 13 03:47:38.482741 kubelet[1983]: I0813 03:47:38.482571 1983 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Aug 13 03:47:38.483786 kubelet[1983]: I0813 03:47:38.483758 1983 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Aug 13 03:47:38.485570 kubelet[1983]: I0813 03:47:38.485506 1983 server.go:1274] "Started kubelet" Aug 13 03:47:38.491088 kubelet[1983]: I0813 03:47:38.491028 1983 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Aug 13 03:47:38.494294 kubelet[1983]: I0813 03:47:38.494265 1983 server.go:449] "Adding debug handlers to kubelet server" Aug 13 03:47:38.499563 kubelet[1983]: I0813 03:47:38.499505 1983 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Aug 13 03:47:38.500331 kubelet[1983]: I0813 03:47:38.500305 1983 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Aug 13 03:47:38.522641 kernel: kauditd_printk_skb: 257 callbacks suppressed Aug 13 03:47:38.523385 kernel: audit: type=1400 audit(1755056858.512:829): avc: denied { mac_admin } for pid=1983 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:38.512000 audit[1983]: AVC avc: denied { mac_admin } for pid=1983 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:38.536758 kernel: audit: type=1401 audit(1755056858.512:829): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 03:47:38.537030 kernel: audit: type=1300 audit(1755056858.512:829): arch=c000003e syscall=188 success=no exit=-22 a0=c000b66f00 a1=c000a3d608 a2=c000b66ed0 a3=25 items=0 ppid=1 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:38.512000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 03:47:38.512000 audit[1983]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b66f00 a1=c000a3d608 a2=c000b66ed0 a3=25 items=0 ppid=1 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:38.512000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 03:47:38.546944 kernel: audit: type=1327 audit(1755056858.512:829): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 03:47:38.548827 kubelet[1983]: I0813 03:47:38.548739 1983 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Aug 13 03:47:38.548000 audit[1983]: AVC avc: denied { mac_admin } for pid=1983 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:38.556059 kernel: audit: type=1400 audit(1755056858.548:830): avc: denied { mac_admin } for pid=1983 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:38.561106 kernel: audit: type=1401 audit(1755056858.548:830): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 03:47:38.548000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 03:47:38.561392 kubelet[1983]: I0813 03:47:38.559759 1983 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Aug 13 03:47:38.548000 audit[1983]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b45660 a1=c000a3d620 a2=c000b67170 a3=25 items=0 ppid=1 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:38.571451 kubelet[1983]: I0813 03:47:38.566671 1983 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Aug 13 03:47:38.571451 kubelet[1983]: I0813 03:47:38.567766 1983 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Aug 13 03:47:38.571451 kubelet[1983]: I0813 03:47:38.570523 1983 volume_manager.go:289] "Starting Kubelet Volume Manager" Aug 13 03:47:38.571963 kernel: audit: type=1300 audit(1755056858.548:830): arch=c000003e syscall=188 success=no exit=-22 a0=c000b45660 a1=c000a3d620 a2=c000b67170 a3=25 items=0 ppid=1 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:38.548000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 03:47:38.586265 kubelet[1983]: I0813 03:47:38.583411 1983 factory.go:221] Registration of the systemd container factory successfully Aug 13 03:47:38.586265 kubelet[1983]: I0813 03:47:38.583606 1983 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Aug 13 03:47:38.588955 kernel: audit: type=1327 audit(1755056858.548:830): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 03:47:38.591323 kubelet[1983]: I0813 03:47:38.591286 1983 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Aug 13 03:47:38.591569 kubelet[1983]: I0813 03:47:38.591544 1983 reconciler.go:26] "Reconciler: start to sync state" Aug 13 03:47:38.598687 kubelet[1983]: I0813 03:47:38.598645 1983 factory.go:221] Registration of the containerd container factory successfully Aug 13 03:47:38.608248 kubelet[1983]: E0813 03:47:38.607257 1983 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Aug 13 03:47:38.676000 kubelet[1983]: I0813 03:47:38.675780 1983 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Aug 13 03:47:38.697690 kubelet[1983]: I0813 03:47:38.697558 1983 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Aug 13 03:47:38.698213 kubelet[1983]: I0813 03:47:38.698153 1983 status_manager.go:217] "Starting to sync pod status with apiserver" Aug 13 03:47:38.699485 kubelet[1983]: I0813 03:47:38.699454 1983 kubelet.go:2321] "Starting kubelet main sync loop" Aug 13 03:47:38.699734 kubelet[1983]: E0813 03:47:38.699699 1983 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Aug 13 03:47:38.746037 kubelet[1983]: I0813 03:47:38.743378 1983 cpu_manager.go:214] "Starting CPU manager" policy="none" Aug 13 03:47:38.747034 kubelet[1983]: I0813 03:47:38.746958 1983 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Aug 13 03:47:38.747348 kubelet[1983]: I0813 03:47:38.747316 1983 state_mem.go:36] "Initialized new in-memory state store" Aug 13 03:47:38.748301 kubelet[1983]: I0813 03:47:38.748261 1983 state_mem.go:88] "Updated default CPUSet" cpuSet="" Aug 13 03:47:38.748460 kubelet[1983]: I0813 03:47:38.748399 1983 state_mem.go:96] "Updated CPUSet assignments" assignments={} Aug 13 03:47:38.748588 kubelet[1983]: I0813 03:47:38.748566 1983 policy_none.go:49] "None policy: Start" Aug 13 03:47:38.751039 kubelet[1983]: I0813 03:47:38.751008 1983 memory_manager.go:170] "Starting memorymanager" policy="None" Aug 13 03:47:38.751299 kubelet[1983]: I0813 03:47:38.751272 1983 state_mem.go:35] "Initializing new in-memory state store" Aug 13 03:47:38.751685 kubelet[1983]: I0813 03:47:38.751632 1983 state_mem.go:75] "Updated machine memory state" Aug 13 03:47:38.765518 kubelet[1983]: I0813 03:47:38.765472 1983 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Aug 13 03:47:38.774539 kernel: audit: type=1400 audit(1755056858.764:831): avc: denied { mac_admin } for pid=1983 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:38.774880 kernel: audit: type=1401 audit(1755056858.764:831): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 03:47:38.764000 audit[1983]: AVC avc: denied { mac_admin } for pid=1983 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:38.764000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 03:47:38.775825 kubelet[1983]: I0813 03:47:38.775772 1983 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Aug 13 03:47:38.776492 kubelet[1983]: I0813 03:47:38.776466 1983 eviction_manager.go:189] "Eviction manager: starting control loop" Aug 13 03:47:38.776705 kubelet[1983]: I0813 03:47:38.776637 1983 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Aug 13 03:47:38.764000 audit[1983]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e89ce0 a1=c001017470 a2=c000e89cb0 a3=25 items=0 ppid=1 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:38.764000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 03:47:38.780024 kubelet[1983]: I0813 03:47:38.779996 1983 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Aug 13 03:47:38.845401 kubelet[1983]: W0813 03:47:38.845304 1983 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Aug 13 03:47:38.846555 kubelet[1983]: W0813 03:47:38.846532 1983 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Aug 13 03:47:38.860117 kubelet[1983]: W0813 03:47:38.860066 1983 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Aug 13 03:47:38.897097 kubelet[1983]: I0813 03:47:38.897017 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.899250 kubelet[1983]: I0813 03:47:38.899202 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d7a66ea3a4572f6144bce6b753a2c4ff-k8s-certs\") pod \"kube-apiserver-srv-amtey.gb1.brightbox.com\" (UID: \"d7a66ea3a4572f6144bce6b753a2c4ff\") " pod="kube-system/kube-apiserver-srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.899491 kubelet[1983]: I0813 03:47:38.899440 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d7a66ea3a4572f6144bce6b753a2c4ff-usr-share-ca-certificates\") pod \"kube-apiserver-srv-amtey.gb1.brightbox.com\" (UID: \"d7a66ea3a4572f6144bce6b753a2c4ff\") " pod="kube-system/kube-apiserver-srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.899688 kubelet[1983]: I0813 03:47:38.899657 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-ca-certs\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.899937 kubelet[1983]: I0813 03:47:38.899862 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-flexvolume-dir\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.900126 kubelet[1983]: I0813 03:47:38.900098 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-k8s-certs\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.900366 kubelet[1983]: I0813 03:47:38.900338 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/31c83f42c8597c216d3da4c3df0819c3-kubeconfig\") pod \"kube-controller-manager-srv-amtey.gb1.brightbox.com\" (UID: \"31c83f42c8597c216d3da4c3df0819c3\") " pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.902613 kubelet[1983]: I0813 03:47:38.902577 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fc88bf91528a055c101853167319923c-kubeconfig\") pod \"kube-scheduler-srv-amtey.gb1.brightbox.com\" (UID: \"fc88bf91528a055c101853167319923c\") " pod="kube-system/kube-scheduler-srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.902837 kubelet[1983]: I0813 03:47:38.902794 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d7a66ea3a4572f6144bce6b753a2c4ff-ca-certs\") pod \"kube-apiserver-srv-amtey.gb1.brightbox.com\" (UID: \"d7a66ea3a4572f6144bce6b753a2c4ff\") " pod="kube-system/kube-apiserver-srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.934272 kubelet[1983]: I0813 03:47:38.934223 1983 kubelet_node_status.go:72] "Attempting to register node" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.953852 kubelet[1983]: I0813 03:47:38.953792 1983 kubelet_node_status.go:111] "Node was previously registered" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:38.954549 kubelet[1983]: I0813 03:47:38.954508 1983 kubelet_node_status.go:75] "Successfully registered node" node="srv-amtey.gb1.brightbox.com" Aug 13 03:47:39.461989 kubelet[1983]: I0813 03:47:39.461895 1983 apiserver.go:52] "Watching apiserver" Aug 13 03:47:39.491722 kubelet[1983]: I0813 03:47:39.491638 1983 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Aug 13 03:47:39.791091 kubelet[1983]: I0813 03:47:39.790823 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-amtey.gb1.brightbox.com" podStartSLOduration=1.790753094 podStartE2EDuration="1.790753094s" podCreationTimestamp="2025-08-13 03:47:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-08-13 03:47:39.765738936 +0000 UTC m=+1.524644727" watchObservedRunningTime="2025-08-13 03:47:39.790753094 +0000 UTC m=+1.549658877" Aug 13 03:47:39.791459 kubelet[1983]: I0813 03:47:39.791089 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-amtey.gb1.brightbox.com" podStartSLOduration=1.791077736 podStartE2EDuration="1.791077736s" podCreationTimestamp="2025-08-13 03:47:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-08-13 03:47:39.790348289 +0000 UTC m=+1.549254084" watchObservedRunningTime="2025-08-13 03:47:39.791077736 +0000 UTC m=+1.549983520" Aug 13 03:47:39.843236 kubelet[1983]: I0813 03:47:39.843130 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-amtey.gb1.brightbox.com" podStartSLOduration=1.843104885 podStartE2EDuration="1.843104885s" podCreationTimestamp="2025-08-13 03:47:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-08-13 03:47:39.816242672 +0000 UTC m=+1.575148461" watchObservedRunningTime="2025-08-13 03:47:39.843104885 +0000 UTC m=+1.602010669" Aug 13 03:47:40.053000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:40.053000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bd5ea0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:47:40.053000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:47:40.058000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:40.058000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bd5f00 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:47:40.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:47:40.060000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:40.060000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000fd180 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:47:40.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:47:40.062000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:47:40.062000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0000fd340 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:47:40.062000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:47:41.215587 kubelet[1983]: I0813 03:47:41.215510 1983 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Aug 13 03:47:41.217162 env[1201]: time="2025-08-13T03:47:41.217077656Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Aug 13 03:47:41.218209 kubelet[1983]: I0813 03:47:41.218151 1983 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Aug 13 03:47:42.242909 systemd[1]: Created slice kubepods-besteffort-pod27d3b31c_78e6_4695_99eb_84e852e09ff1.slice. Aug 13 03:47:42.246368 kubelet[1983]: W0813 03:47:42.246297 1983 reflector.go:561] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-amtey.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-amtey.gb1.brightbox.com' and this object Aug 13 03:47:42.246811 kubelet[1983]: E0813 03:47:42.246392 1983 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:srv-amtey.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'srv-amtey.gb1.brightbox.com' and this object" logger="UnhandledError" Aug 13 03:47:42.246811 kubelet[1983]: W0813 03:47:42.246734 1983 reflector.go:561] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:srv-amtey.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-amtey.gb1.brightbox.com' and this object Aug 13 03:47:42.246811 kubelet[1983]: E0813 03:47:42.246785 1983 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-proxy\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-proxy\" is forbidden: User \"system:node:srv-amtey.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'srv-amtey.gb1.brightbox.com' and this object" logger="UnhandledError" Aug 13 03:47:42.342136 kubelet[1983]: I0813 03:47:42.342055 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/27d3b31c-78e6-4695-99eb-84e852e09ff1-kube-proxy\") pod \"kube-proxy-lnhtj\" (UID: \"27d3b31c-78e6-4695-99eb-84e852e09ff1\") " pod="kube-system/kube-proxy-lnhtj" Aug 13 03:47:42.342622 kubelet[1983]: I0813 03:47:42.342572 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ffrl8\" (UniqueName: \"kubernetes.io/projected/27d3b31c-78e6-4695-99eb-84e852e09ff1-kube-api-access-ffrl8\") pod \"kube-proxy-lnhtj\" (UID: \"27d3b31c-78e6-4695-99eb-84e852e09ff1\") " pod="kube-system/kube-proxy-lnhtj" Aug 13 03:47:42.342818 kubelet[1983]: I0813 03:47:42.342789 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/27d3b31c-78e6-4695-99eb-84e852e09ff1-xtables-lock\") pod \"kube-proxy-lnhtj\" (UID: \"27d3b31c-78e6-4695-99eb-84e852e09ff1\") " pod="kube-system/kube-proxy-lnhtj" Aug 13 03:47:42.343146 kubelet[1983]: I0813 03:47:42.343118 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/27d3b31c-78e6-4695-99eb-84e852e09ff1-lib-modules\") pod \"kube-proxy-lnhtj\" (UID: \"27d3b31c-78e6-4695-99eb-84e852e09ff1\") " pod="kube-system/kube-proxy-lnhtj" Aug 13 03:47:42.439874 kubelet[1983]: W0813 03:47:42.439476 1983 reflector.go:561] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:srv-amtey.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'srv-amtey.gb1.brightbox.com' and this object Aug 13 03:47:42.439874 kubelet[1983]: E0813 03:47:42.439546 1983 reflector.go:158] "Unhandled Error" err="object-\"tigera-operator\"/\"kubernetes-services-endpoint\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kubernetes-services-endpoint\" is forbidden: User \"system:node:srv-amtey.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'srv-amtey.gb1.brightbox.com' and this object" logger="UnhandledError" Aug 13 03:47:42.439874 kubelet[1983]: W0813 03:47:42.439780 1983 reflector.go:561] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-amtey.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'srv-amtey.gb1.brightbox.com' and this object Aug 13 03:47:42.439874 kubelet[1983]: E0813 03:47:42.439812 1983 reflector.go:158] "Unhandled Error" err="object-\"tigera-operator\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:srv-amtey.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'srv-amtey.gb1.brightbox.com' and this object" logger="UnhandledError" Aug 13 03:47:42.442115 systemd[1]: Created slice kubepods-besteffort-podbd98a719_6435_40b1_b8fe_3c7f345da8f7.slice. Aug 13 03:47:42.545215 kubelet[1983]: I0813 03:47:42.544202 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-666lm\" (UniqueName: \"kubernetes.io/projected/bd98a719-6435-40b1-b8fe-3c7f345da8f7-kube-api-access-666lm\") pod \"tigera-operator-5bf8dfcb4-mltgt\" (UID: \"bd98a719-6435-40b1-b8fe-3c7f345da8f7\") " pod="tigera-operator/tigera-operator-5bf8dfcb4-mltgt" Aug 13 03:47:42.545215 kubelet[1983]: I0813 03:47:42.545064 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bd98a719-6435-40b1-b8fe-3c7f345da8f7-var-lib-calico\") pod \"tigera-operator-5bf8dfcb4-mltgt\" (UID: \"bd98a719-6435-40b1-b8fe-3c7f345da8f7\") " pod="tigera-operator/tigera-operator-5bf8dfcb4-mltgt" Aug 13 03:47:43.460995 kubelet[1983]: E0813 03:47:43.460912 1983 projected.go:288] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Aug 13 03:47:43.461765 kubelet[1983]: E0813 03:47:43.461733 1983 projected.go:194] Error preparing data for projected volume kube-api-access-ffrl8 for pod kube-system/kube-proxy-lnhtj: failed to sync configmap cache: timed out waiting for the condition Aug 13 03:47:43.462063 kubelet[1983]: E0813 03:47:43.462025 1983 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/27d3b31c-78e6-4695-99eb-84e852e09ff1-kube-api-access-ffrl8 podName:27d3b31c-78e6-4695-99eb-84e852e09ff1 nodeName:}" failed. No retries permitted until 2025-08-13 03:47:43.961964298 +0000 UTC m=+5.720870075 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-ffrl8" (UniqueName: "kubernetes.io/projected/27d3b31c-78e6-4695-99eb-84e852e09ff1-kube-api-access-ffrl8") pod "kube-proxy-lnhtj" (UID: "27d3b31c-78e6-4695-99eb-84e852e09ff1") : failed to sync configmap cache: timed out waiting for the condition Aug 13 03:47:43.580289 kubelet[1983]: I0813 03:47:43.577873 1983 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Aug 13 03:47:43.650131 env[1201]: time="2025-08-13T03:47:43.650006977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-5bf8dfcb4-mltgt,Uid:bd98a719-6435-40b1-b8fe-3c7f345da8f7,Namespace:tigera-operator,Attempt:0,}" Aug 13 03:47:43.694964 env[1201]: time="2025-08-13T03:47:43.694755669Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:47:43.695406 env[1201]: time="2025-08-13T03:47:43.695322279Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:47:43.695621 env[1201]: time="2025-08-13T03:47:43.695565067Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:47:43.696316 env[1201]: time="2025-08-13T03:47:43.696263867Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c6ac00e60c933f463ba5ef5ef0920623923e9dc4ad748a0d098b51d3969f2dbf pid=2039 runtime=io.containerd.runc.v2 Aug 13 03:47:43.750168 systemd[1]: Started cri-containerd-c6ac00e60c933f463ba5ef5ef0920623923e9dc4ad748a0d098b51d3969f2dbf.scope. Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.774418 kernel: kauditd_printk_skb: 14 callbacks suppressed Aug 13 03:47:43.774655 kernel: audit: type=1400 audit(1755056863.769:836): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.780198 kernel: audit: type=1400 audit(1755056863.769:837): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.791034 kernel: audit: type=1400 audit(1755056863.769:838): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.791286 kernel: audit: type=1400 audit(1755056863.769:839): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801747 kernel: audit: type=1400 audit(1755056863.769:840): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.808047 kernel: audit: type=1400 audit(1755056863.769:841): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.808185 kernel: audit: type=1400 audit(1755056863.769:842): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.821275 kernel: audit: type=1400 audit(1755056863.769:843): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.821456 kernel: audit: type=1400 audit(1755056863.769:844): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.830680 kernel: audit: type=1400 audit(1755056863.769:845): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.769000 audit: BPF prog-id=106 op=LOAD Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:43.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616330306536306339333366343633626135656635656630393230 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:43.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616330306536306339333366343633626135656635656630393230 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.779000 audit: BPF prog-id=107 op=LOAD Aug 13 03:47:43.779000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c00037f430 items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:43.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616330306536306339333366343633626135656635656630393230 Aug 13 03:47:43.795000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.795000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.795000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.795000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.795000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.795000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.795000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.795000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.795000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.795000 audit: BPF prog-id=108 op=LOAD Aug 13 03:47:43.795000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c00037f478 items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:43.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616330306536306339333366343633626135656635656630393230 Aug 13 03:47:43.801000 audit: BPF prog-id=108 op=UNLOAD Aug 13 03:47:43.801000 audit: BPF prog-id=107 op=UNLOAD Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:43.801000 audit: BPF prog-id=109 op=LOAD Aug 13 03:47:43.801000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c00037f888 items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:43.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616330306536306339333366343633626135656635656630393230 Aug 13 03:47:43.889455 env[1201]: time="2025-08-13T03:47:43.888334631Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-5bf8dfcb4-mltgt,Uid:bd98a719-6435-40b1-b8fe-3c7f345da8f7,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c6ac00e60c933f463ba5ef5ef0920623923e9dc4ad748a0d098b51d3969f2dbf\"" Aug 13 03:47:43.894514 env[1201]: time="2025-08-13T03:47:43.894453389Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.3\"" Aug 13 03:47:44.352499 env[1201]: time="2025-08-13T03:47:44.352413754Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lnhtj,Uid:27d3b31c-78e6-4695-99eb-84e852e09ff1,Namespace:kube-system,Attempt:0,}" Aug 13 03:47:44.379567 env[1201]: time="2025-08-13T03:47:44.379360062Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:47:44.379567 env[1201]: time="2025-08-13T03:47:44.379453700Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:47:44.379567 env[1201]: time="2025-08-13T03:47:44.379510044Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:47:44.381045 env[1201]: time="2025-08-13T03:47:44.380385979Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c73865bb6993eadee01d0b0221f0f067da614a5d87e53583df77351a40b13055 pid=2080 runtime=io.containerd.runc.v2 Aug 13 03:47:44.402892 systemd[1]: Started cri-containerd-c73865bb6993eadee01d0b0221f0f067da614a5d87e53583df77351a40b13055.scope. Aug 13 03:47:44.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.434000 audit: BPF prog-id=110 op=LOAD Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2080 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:44.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333836356262363939336561646565303164306230323231663066 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2080 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:44.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333836356262363939336561646565303164306230323231663066 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit: BPF prog-id=111 op=LOAD Aug 13 03:47:44.435000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a8e70 items=0 ppid=2080 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:44.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333836356262363939336561646565303164306230323231663066 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.435000 audit: BPF prog-id=112 op=LOAD Aug 13 03:47:44.435000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a8eb8 items=0 ppid=2080 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:44.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333836356262363939336561646565303164306230323231663066 Aug 13 03:47:44.436000 audit: BPF prog-id=112 op=UNLOAD Aug 13 03:47:44.436000 audit: BPF prog-id=111 op=UNLOAD Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.436000 audit: BPF prog-id=113 op=LOAD Aug 13 03:47:44.436000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a92c8 items=0 ppid=2080 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337333836356262363939336561646565303164306230323231663066 Aug 13 03:47:44.460465 env[1201]: time="2025-08-13T03:47:44.460390877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lnhtj,Uid:27d3b31c-78e6-4695-99eb-84e852e09ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"c73865bb6993eadee01d0b0221f0f067da614a5d87e53583df77351a40b13055\"" Aug 13 03:47:44.468559 env[1201]: time="2025-08-13T03:47:44.468351882Z" level=info msg="CreateContainer within sandbox \"c73865bb6993eadee01d0b0221f0f067da614a5d87e53583df77351a40b13055\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Aug 13 03:47:44.501523 env[1201]: time="2025-08-13T03:47:44.501395365Z" level=info msg="CreateContainer within sandbox \"c73865bb6993eadee01d0b0221f0f067da614a5d87e53583df77351a40b13055\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"72ca0a3ae9975523870932651cfb09f401c6d35250906a3af0c0dfdde7fd02f0\"" Aug 13 03:47:44.503139 env[1201]: time="2025-08-13T03:47:44.503086787Z" level=info msg="StartContainer for \"72ca0a3ae9975523870932651cfb09f401c6d35250906a3af0c0dfdde7fd02f0\"" Aug 13 03:47:44.533250 systemd[1]: Started cri-containerd-72ca0a3ae9975523870932651cfb09f401c6d35250906a3af0c0dfdde7fd02f0.scope. Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb9c0142578 items=0 ppid=2080 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:44.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732636130613361653939373535323338373039333236353163666230 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit: BPF prog-id=114 op=LOAD Aug 13 03:47:44.574000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002a5358 items=0 ppid=2080 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:44.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732636130613361653939373535323338373039333236353163666230 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit: BPF prog-id=115 op=LOAD Aug 13 03:47:44.574000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002a53a8 items=0 ppid=2080 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:44.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732636130613361653939373535323338373039333236353163666230 Aug 13 03:47:44.574000 audit: BPF prog-id=115 op=UNLOAD Aug 13 03:47:44.574000 audit: BPF prog-id=114 op=UNLOAD Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:44.574000 audit: BPF prog-id=116 op=LOAD Aug 13 03:47:44.574000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002a5438 items=0 ppid=2080 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:44.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732636130613361653939373535323338373039333236353163666230 Aug 13 03:47:44.593730 systemd[1]: run-containerd-runc-k8s.io-c6ac00e60c933f463ba5ef5ef0920623923e9dc4ad748a0d098b51d3969f2dbf-runc.PZI0ZV.mount: Deactivated successfully. Aug 13 03:47:44.622424 env[1201]: time="2025-08-13T03:47:44.622227712Z" level=info msg="StartContainer for \"72ca0a3ae9975523870932651cfb09f401c6d35250906a3af0c0dfdde7fd02f0\" returns successfully" Aug 13 03:47:44.757759 kubelet[1983]: I0813 03:47:44.757641 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-lnhtj" podStartSLOduration=2.757609456 podStartE2EDuration="2.757609456s" podCreationTimestamp="2025-08-13 03:47:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-08-13 03:47:44.75657981 +0000 UTC m=+6.515485593" watchObservedRunningTime="2025-08-13 03:47:44.757609456 +0000 UTC m=+6.516515237" Aug 13 03:47:45.214000 audit[2182]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.214000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc73f4ca60 a2=0 a3=7ffc73f4ca4c items=0 ppid=2131 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Aug 13 03:47:45.230000 audit[2183]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.230000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff286be6a0 a2=0 a3=7fff286be68c items=0 ppid=2131 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Aug 13 03:47:45.242000 audit[2184]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.242000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe22ebcd10 a2=0 a3=7ffe22ebccfc items=0 ppid=2131 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Aug 13 03:47:45.247000 audit[2185]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.247000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff227b3f90 a2=0 a3=7fff227b3f7c items=0 ppid=2131 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Aug 13 03:47:45.251000 audit[2187]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.251000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd1e6eaa0 a2=0 a3=7ffdd1e6ea8c items=0 ppid=2131 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Aug 13 03:47:45.252000 audit[2186]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.252000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd45ad60f0 a2=0 a3=7ffd45ad60dc items=0 ppid=2131 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Aug 13 03:47:45.386000 audit[2188]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.386000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe4a279f90 a2=0 a3=7ffe4a279f7c items=0 ppid=2131 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Aug 13 03:47:45.395000 audit[2190]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.395000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff62e3ab90 a2=0 a3=7fff62e3ab7c items=0 ppid=2131 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Aug 13 03:47:45.403000 audit[2193]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.403000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffda084aec0 a2=0 a3=7ffda084aeac items=0 ppid=2131 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Aug 13 03:47:45.404000 audit[2194]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.404000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd4e8a5b0 a2=0 a3=7fffd4e8a59c items=0 ppid=2131 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Aug 13 03:47:45.409000 audit[2196]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.409000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1ec37430 a2=0 a3=7ffc1ec3741c items=0 ppid=2131 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Aug 13 03:47:45.414000 audit[2197]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.414000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe819d5230 a2=0 a3=7ffe819d521c items=0 ppid=2131 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Aug 13 03:47:45.419000 audit[2199]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.419000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf30eb600 a2=0 a3=7ffdf30eb5ec items=0 ppid=2131 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Aug 13 03:47:45.427000 audit[2202]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.427000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe35dc9710 a2=0 a3=7ffe35dc96fc items=0 ppid=2131 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Aug 13 03:47:45.427000 audit[2203]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.427000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd59d8d70 a2=0 a3=7fffd59d8d5c items=0 ppid=2131 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Aug 13 03:47:45.435000 audit[2205]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.435000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2d602330 a2=0 a3=7ffe2d60231c items=0 ppid=2131 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Aug 13 03:47:45.435000 audit[2206]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.435000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda9afbae0 a2=0 a3=7ffda9afbacc items=0 ppid=2131 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Aug 13 03:47:45.440000 audit[2208]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.440000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea03eb230 a2=0 a3=7ffea03eb21c items=0 ppid=2131 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 03:47:45.447000 audit[2211]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.447000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7efec510 a2=0 a3=7ffd7efec4fc items=0 ppid=2131 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 03:47:45.460000 audit[2214]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.460000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeca327e40 a2=0 a3=7ffeca327e2c items=0 ppid=2131 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Aug 13 03:47:45.461000 audit[2215]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.461000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd6902a670 a2=0 a3=7ffd6902a65c items=0 ppid=2131 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Aug 13 03:47:45.467000 audit[2217]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.467000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffff2d845e0 a2=0 a3=7ffff2d845cc items=0 ppid=2131 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 03:47:45.475000 audit[2220]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.475000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff05070110 a2=0 a3=7fff050700fc items=0 ppid=2131 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 03:47:45.477000 audit[2221]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.477000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc89ca1730 a2=0 a3=7ffc89ca171c items=0 ppid=2131 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Aug 13 03:47:45.481000 audit[2223]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 03:47:45.481000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd47c10ec0 a2=0 a3=7ffd47c10eac items=0 ppid=2131 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Aug 13 03:47:45.552000 audit[2229]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:47:45.552000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff6757cd10 a2=0 a3=7fff6757ccfc items=0 ppid=2131 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.552000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:47:45.575000 audit[2229]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:47:45.575000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff6757cd10 a2=0 a3=7fff6757ccfc items=0 ppid=2131 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:47:45.579000 audit[2234]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.579000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffebab94a40 a2=0 a3=7ffebab94a2c items=0 ppid=2131 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Aug 13 03:47:45.586000 audit[2236]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.586000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc05dc07c0 a2=0 a3=7ffc05dc07ac items=0 ppid=2131 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Aug 13 03:47:45.596000 audit[2239]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.596000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd27124c80 a2=0 a3=7ffd27124c6c items=0 ppid=2131 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Aug 13 03:47:45.597000 audit[2240]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.597000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff29628f20 a2=0 a3=7fff29628f0c items=0 ppid=2131 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Aug 13 03:47:45.624000 audit[2242]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.624000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb6075ea0 a2=0 a3=7ffeb6075e8c items=0 ppid=2131 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Aug 13 03:47:45.628000 audit[2243]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.628000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdab537740 a2=0 a3=7ffdab53772c items=0 ppid=2131 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Aug 13 03:47:45.631000 audit[2245]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.631000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec4c47790 a2=0 a3=7ffec4c4777c items=0 ppid=2131 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Aug 13 03:47:45.642000 audit[2248]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.642000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe486bc3b0 a2=0 a3=7ffe486bc39c items=0 ppid=2131 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Aug 13 03:47:45.644000 audit[2249]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.644000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2711ddd0 a2=0 a3=7fff2711ddbc items=0 ppid=2131 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Aug 13 03:47:45.648000 audit[2251]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.648000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5e002d90 a2=0 a3=7ffc5e002d7c items=0 ppid=2131 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Aug 13 03:47:45.651000 audit[2252]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.651000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff497c57d0 a2=0 a3=7fff497c57bc items=0 ppid=2131 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Aug 13 03:47:45.656000 audit[2254]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.656000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffece2e4c40 a2=0 a3=7ffece2e4c2c items=0 ppid=2131 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 03:47:45.670000 audit[2257]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.670000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7e46f680 a2=0 a3=7ffe7e46f66c items=0 ppid=2131 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Aug 13 03:47:45.689000 audit[2260]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.689000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd94023520 a2=0 a3=7ffd9402350c items=0 ppid=2131 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Aug 13 03:47:45.692000 audit[2261]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.692000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff65578e10 a2=0 a3=7fff65578dfc items=0 ppid=2131 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Aug 13 03:47:45.705000 audit[2263]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.705000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffefa22e6b0 a2=0 a3=7ffefa22e69c items=0 ppid=2131 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 03:47:45.711000 audit[2266]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.711000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe65c1dfc0 a2=0 a3=7ffe65c1dfac items=0 ppid=2131 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 03:47:45.713000 audit[2267]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.713000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7e5f9bc0 a2=0 a3=7ffd7e5f9bac items=0 ppid=2131 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Aug 13 03:47:45.719000 audit[2269]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.719000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff947ddf70 a2=0 a3=7fff947ddf5c items=0 ppid=2131 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Aug 13 03:47:45.723000 audit[2270]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.723000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0d960e80 a2=0 a3=7ffe0d960e6c items=0 ppid=2131 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.723000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Aug 13 03:47:45.728000 audit[2272]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.728000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6b58e1f0 a2=0 a3=7ffc6b58e1dc items=0 ppid=2131 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 03:47:45.734000 audit[2275]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 03:47:45.734000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcda315dd0 a2=0 a3=7ffcda315dbc items=0 ppid=2131 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 03:47:45.740000 audit[2277]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Aug 13 03:47:45.740000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff34977990 a2=0 a3=7fff3497797c items=0 ppid=2131 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.740000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:47:45.741000 audit[2277]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Aug 13 03:47:45.741000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff34977990 a2=0 a3=7fff3497797c items=0 ppid=2131 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:45.741000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:47:46.069007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3848296879.mount: Deactivated successfully. Aug 13 03:47:47.526887 env[1201]: time="2025-08-13T03:47:47.526813101Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:47.530885 env[1201]: time="2025-08-13T03:47:47.530836238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8bde16470b09d1963e19456806d73180c9778a6c2b3c1fda2335c67c1cd4ce93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:47.533003 env[1201]: time="2025-08-13T03:47:47.532966756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:47.536859 env[1201]: time="2025-08-13T03:47:47.536811252Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:dbf1bad0def7b5955dc8e4aeee96e23ead0bc5822f6872518e685cd0ed484121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:47:47.537888 env[1201]: time="2025-08-13T03:47:47.537847899Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.3\" returns image reference \"sha256:8bde16470b09d1963e19456806d73180c9778a6c2b3c1fda2335c67c1cd4ce93\"" Aug 13 03:47:47.545250 env[1201]: time="2025-08-13T03:47:47.545179102Z" level=info msg="CreateContainer within sandbox \"c6ac00e60c933f463ba5ef5ef0920623923e9dc4ad748a0d098b51d3969f2dbf\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Aug 13 03:47:47.564281 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2057278726.mount: Deactivated successfully. Aug 13 03:47:47.593444 env[1201]: time="2025-08-13T03:47:47.593349711Z" level=info msg="CreateContainer within sandbox \"c6ac00e60c933f463ba5ef5ef0920623923e9dc4ad748a0d098b51d3969f2dbf\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8\"" Aug 13 03:47:47.595342 env[1201]: time="2025-08-13T03:47:47.595305468Z" level=info msg="StartContainer for \"f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8\"" Aug 13 03:47:47.634861 systemd[1]: Started cri-containerd-f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8.scope. Aug 13 03:47:47.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.677000 audit: BPF prog-id=117 op=LOAD Aug 13 03:47:47.678000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.678000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2039 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:47.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626632313566393362633165353932383362353033656233333166 Aug 13 03:47:47.679000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.679000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2039 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:47.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626632313566393362633165353932383362353033656233333166 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.680000 audit: BPF prog-id=118 op=LOAD Aug 13 03:47:47.680000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00034e1f0 items=0 ppid=2039 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:47.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626632313566393362633165353932383362353033656233333166 Aug 13 03:47:47.681000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.681000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.681000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.681000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.681000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.681000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.681000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.681000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.681000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.681000 audit: BPF prog-id=119 op=LOAD Aug 13 03:47:47.681000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00034e238 items=0 ppid=2039 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:47.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626632313566393362633165353932383362353033656233333166 Aug 13 03:47:47.682000 audit: BPF prog-id=119 op=UNLOAD Aug 13 03:47:47.682000 audit: BPF prog-id=118 op=UNLOAD Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:47:47.683000 audit: BPF prog-id=120 op=LOAD Aug 13 03:47:47.683000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034e648 items=0 ppid=2039 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:47.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626632313566393362633165353932383362353033656233333166 Aug 13 03:47:47.727056 env[1201]: time="2025-08-13T03:47:47.726915680Z" level=info msg="StartContainer for \"f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8\" returns successfully" Aug 13 03:47:47.776079 kubelet[1983]: I0813 03:47:47.775965 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-5bf8dfcb4-mltgt" podStartSLOduration=2.128043946 podStartE2EDuration="5.775885235s" podCreationTimestamp="2025-08-13 03:47:42 +0000 UTC" firstStartedPulling="2025-08-13 03:47:43.892163807 +0000 UTC m=+5.651069586" lastFinishedPulling="2025-08-13 03:47:47.540005096 +0000 UTC m=+9.298910875" observedRunningTime="2025-08-13 03:47:47.774984508 +0000 UTC m=+9.533890299" watchObservedRunningTime="2025-08-13 03:47:47.775885235 +0000 UTC m=+9.534791027" Aug 13 03:47:55.463255 sudo[1363]: pam_unix(sudo:session): session closed for user root Aug 13 03:47:55.478370 kernel: kauditd_printk_skb: 357 callbacks suppressed Aug 13 03:47:55.479074 kernel: audit: type=1106 audit(1755056875.462:947): pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:47:55.462000 audit[1363]: USER_END pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:47:55.462000 audit[1363]: CRED_DISP pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:47:55.489955 kernel: audit: type=1104 audit(1755056875.462:948): pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 03:47:55.630517 sshd[1360]: pam_unix(sshd:session): session closed for user core Aug 13 03:47:55.645221 kernel: audit: type=1106 audit(1755056875.634:949): pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:47:55.634000 audit[1360]: USER_END pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:47:55.646954 systemd[1]: sshd@6-10.244.16.30:22-139.178.89.65:33368.service: Deactivated successfully. Aug 13 03:47:55.648208 systemd[1]: session-7.scope: Deactivated successfully. Aug 13 03:47:55.648423 systemd[1]: session-7.scope: Consumed 6.210s CPU time. Aug 13 03:47:55.650347 systemd-logind[1192]: Session 7 logged out. Waiting for processes to exit. Aug 13 03:47:55.652538 systemd-logind[1192]: Removed session 7. Aug 13 03:47:55.634000 audit[1360]: CRED_DISP pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:47:55.676322 kernel: audit: type=1104 audit(1755056875.634:950): pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:47:55.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.244.16.30:22-139.178.89.65:33368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:55.686955 kernel: audit: type=1131 audit(1755056875.646:951): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.244.16.30:22-139.178.89.65:33368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:47:56.821000 audit[2364]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:47:56.831955 kernel: audit: type=1325 audit(1755056876.821:952): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:47:56.821000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffff43e9100 a2=0 a3=7ffff43e90ec items=0 ppid=2131 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:56.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:47:56.844627 kernel: audit: type=1300 audit(1755056876.821:952): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffff43e9100 a2=0 a3=7ffff43e90ec items=0 ppid=2131 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:56.844769 kernel: audit: type=1327 audit(1755056876.821:952): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:47:56.845000 audit[2364]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:47:56.850984 kernel: audit: type=1325 audit(1755056876.845:953): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:47:56.845000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffff43e9100 a2=0 a3=0 items=0 ppid=2131 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:56.861948 kernel: audit: type=1300 audit(1755056876.845:953): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffff43e9100 a2=0 a3=0 items=0 ppid=2131 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:56.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:47:56.906000 audit[2366]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:47:56.906000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd116e990 a2=0 a3=7ffdd116e97c items=0 ppid=2131 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:56.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:47:56.910000 audit[2366]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:47:56.910000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd116e990 a2=0 a3=0 items=0 ppid=2131 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:47:56.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:00.444000 audit[2371]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:00.444000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe066af4e0 a2=0 a3=7ffe066af4cc items=0 ppid=2131 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:00.444000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:00.454000 audit[2371]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:00.454000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe066af4e0 a2=0 a3=0 items=0 ppid=2131 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:00.476032 kernel: kauditd_printk_skb: 11 callbacks suppressed Aug 13 03:48:00.476430 kernel: audit: type=1300 audit(1755056880.454:957): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe066af4e0 a2=0 a3=0 items=0 ppid=2131 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:00.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:00.491024 kernel: audit: type=1327 audit(1755056880.454:957): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:00.558286 systemd[1]: Created slice kubepods-besteffort-pod3b320d47_647c_4854_9c17_c1417917e0ff.slice. Aug 13 03:48:00.588000 audit[2373]: NETFILTER_CFG table=filter:95 family=2 entries=19 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:00.594971 kernel: audit: type=1325 audit(1755056880.588:958): table=filter:95 family=2 entries=19 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:00.595345 kubelet[1983]: I0813 03:48:00.595285 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3b320d47-647c-4854-9c17-c1417917e0ff-typha-certs\") pod \"calico-typha-76f785f87b-26shr\" (UID: \"3b320d47-647c-4854-9c17-c1417917e0ff\") " pod="calico-system/calico-typha-76f785f87b-26shr" Aug 13 03:48:00.596000 kubelet[1983]: I0813 03:48:00.595383 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3b320d47-647c-4854-9c17-c1417917e0ff-tigera-ca-bundle\") pod \"calico-typha-76f785f87b-26shr\" (UID: \"3b320d47-647c-4854-9c17-c1417917e0ff\") " pod="calico-system/calico-typha-76f785f87b-26shr" Aug 13 03:48:00.596000 kubelet[1983]: I0813 03:48:00.595435 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r8hvt\" (UniqueName: \"kubernetes.io/projected/3b320d47-647c-4854-9c17-c1417917e0ff-kube-api-access-r8hvt\") pod \"calico-typha-76f785f87b-26shr\" (UID: \"3b320d47-647c-4854-9c17-c1417917e0ff\") " pod="calico-system/calico-typha-76f785f87b-26shr" Aug 13 03:48:00.588000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffe2b9bd10 a2=0 a3=7fffe2b9bcfc items=0 ppid=2131 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:00.610012 kernel: audit: type=1300 audit(1755056880.588:958): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffe2b9bd10 a2=0 a3=7fffe2b9bcfc items=0 ppid=2131 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:00.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:00.616956 kernel: audit: type=1327 audit(1755056880.588:958): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:00.609000 audit[2373]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:00.609000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe2b9bd10 a2=0 a3=0 items=0 ppid=2131 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:00.629823 kernel: audit: type=1325 audit(1755056880.609:959): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:00.630098 kernel: audit: type=1300 audit(1755056880.609:959): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe2b9bd10 a2=0 a3=0 items=0 ppid=2131 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:00.609000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:00.638957 kernel: audit: type=1327 audit(1755056880.609:959): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:00.834979 systemd[1]: Created slice kubepods-besteffort-pod2597b433_ced4_47b6_90c2_117e047ff521.slice. Aug 13 03:48:00.867634 env[1201]: time="2025-08-13T03:48:00.866701034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76f785f87b-26shr,Uid:3b320d47-647c-4854-9c17-c1417917e0ff,Namespace:calico-system,Attempt:0,}" Aug 13 03:48:00.898547 kubelet[1983]: I0813 03:48:00.898464 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2597b433-ced4-47b6-90c2-117e047ff521-var-run-calico\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.898875 kubelet[1983]: I0813 03:48:00.898572 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2597b433-ced4-47b6-90c2-117e047ff521-node-certs\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.898875 kubelet[1983]: I0813 03:48:00.898629 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2597b433-ced4-47b6-90c2-117e047ff521-flexvol-driver-host\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.898875 kubelet[1983]: I0813 03:48:00.898716 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2597b433-ced4-47b6-90c2-117e047ff521-cni-net-dir\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.898875 kubelet[1983]: I0813 03:48:00.898762 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2597b433-ced4-47b6-90c2-117e047ff521-lib-modules\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.898875 kubelet[1983]: I0813 03:48:00.898815 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2597b433-ced4-47b6-90c2-117e047ff521-tigera-ca-bundle\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.899254 kubelet[1983]: I0813 03:48:00.898876 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2597b433-ced4-47b6-90c2-117e047ff521-policysync\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.899254 kubelet[1983]: I0813 03:48:00.898910 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dm9nt\" (UniqueName: \"kubernetes.io/projected/2597b433-ced4-47b6-90c2-117e047ff521-kube-api-access-dm9nt\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.899254 kubelet[1983]: I0813 03:48:00.898961 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2597b433-ced4-47b6-90c2-117e047ff521-cni-bin-dir\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.899254 kubelet[1983]: I0813 03:48:00.898995 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2597b433-ced4-47b6-90c2-117e047ff521-var-lib-calico\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.899254 kubelet[1983]: I0813 03:48:00.899049 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2597b433-ced4-47b6-90c2-117e047ff521-xtables-lock\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.899639 kubelet[1983]: I0813 03:48:00.899080 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2597b433-ced4-47b6-90c2-117e047ff521-cni-log-dir\") pod \"calico-node-dpn84\" (UID: \"2597b433-ced4-47b6-90c2-117e047ff521\") " pod="calico-system/calico-node-dpn84" Aug 13 03:48:00.906961 env[1201]: time="2025-08-13T03:48:00.906024580Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:00.906961 env[1201]: time="2025-08-13T03:48:00.906094062Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:00.906961 env[1201]: time="2025-08-13T03:48:00.906120263Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:00.906961 env[1201]: time="2025-08-13T03:48:00.906734952Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/642fee96efc07867cfab52a8a46ad16f3139470f744089af202fc0472c698998 pid=2383 runtime=io.containerd.runc.v2 Aug 13 03:48:00.961542 systemd[1]: Started cri-containerd-642fee96efc07867cfab52a8a46ad16f3139470f744089af202fc0472c698998.scope. Aug 13 03:48:01.005426 kubelet[1983]: E0813 03:48:01.005373 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.005687 kubelet[1983]: W0813 03:48:01.005652 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.005888 kubelet[1983]: E0813 03:48:01.005839 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.006271 kubelet[1983]: E0813 03:48:01.006248 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.006410 kubelet[1983]: W0813 03:48:01.006384 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.006585 kubelet[1983]: E0813 03:48:01.006559 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.006954 kubelet[1983]: E0813 03:48:01.006915 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.007193 kubelet[1983]: W0813 03:48:01.007159 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.007282 kubelet[1983]: E0813 03:48:01.007195 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.009908 kubelet[1983]: E0813 03:48:01.009046 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.009908 kubelet[1983]: W0813 03:48:01.009071 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.009908 kubelet[1983]: E0813 03:48:01.009097 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.011069 kubelet[1983]: E0813 03:48:01.011022 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.011069 kubelet[1983]: W0813 03:48:01.011064 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.011230 kubelet[1983]: E0813 03:48:01.011092 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.011530 kubelet[1983]: E0813 03:48:01.011504 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.011610 kubelet[1983]: W0813 03:48:01.011545 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.011610 kubelet[1983]: E0813 03:48:01.011565 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.025348 kubelet[1983]: E0813 03:48:01.025280 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044958 kernel: audit: type=1400 audit(1755056881.034:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.053983 kernel: audit: type=1400 audit(1755056881.034:961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.034000 audit: BPF prog-id=121 op=LOAD Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326665653936656663303738363763666162353261386134366164 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326665653936656663303738363763666162353261386134366164 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit: BPF prog-id=122 op=LOAD Aug 13 03:48:01.044000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002961d0 items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326665653936656663303738363763666162353261386134366164 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.044000 audit: BPF prog-id=123 op=LOAD Aug 13 03:48:01.044000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000296218 items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326665653936656663303738363763666162353261386134366164 Aug 13 03:48:01.044000 audit: BPF prog-id=123 op=UNLOAD Aug 13 03:48:01.044000 audit: BPF prog-id=122 op=UNLOAD Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.045000 audit: BPF prog-id=124 op=LOAD Aug 13 03:48:01.045000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000296628 items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326665653936656663303738363763666162353261386134366164 Aug 13 03:48:01.081464 kubelet[1983]: E0813 03:48:01.081423 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.081707 kubelet[1983]: W0813 03:48:01.081676 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.081854 kubelet[1983]: E0813 03:48:01.081825 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.082657 kubelet[1983]: E0813 03:48:01.082634 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.082797 kubelet[1983]: W0813 03:48:01.082771 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.082986 kubelet[1983]: E0813 03:48:01.082958 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.085037 kubelet[1983]: E0813 03:48:01.085011 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.088018 kubelet[1983]: W0813 03:48:01.085150 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.088188 kubelet[1983]: E0813 03:48:01.088161 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.091053 kubelet[1983]: E0813 03:48:01.091027 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.091205 kubelet[1983]: W0813 03:48:01.091177 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.091356 kubelet[1983]: E0813 03:48:01.091330 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.093232 kubelet[1983]: E0813 03:48:01.093205 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.093392 kubelet[1983]: W0813 03:48:01.093364 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.093553 kubelet[1983]: E0813 03:48:01.093527 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.094206 kubelet[1983]: E0813 03:48:01.094184 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.094335 kubelet[1983]: W0813 03:48:01.094310 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.094475 kubelet[1983]: E0813 03:48:01.094449 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.095017 kubelet[1983]: E0813 03:48:01.094992 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.095222 kubelet[1983]: W0813 03:48:01.095193 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.095342 kubelet[1983]: E0813 03:48:01.095316 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.097380 kubelet[1983]: E0813 03:48:01.097355 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.097605 kubelet[1983]: W0813 03:48:01.097579 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.097785 kubelet[1983]: E0813 03:48:01.097710 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.098283 kubelet[1983]: E0813 03:48:01.098260 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.098401 kubelet[1983]: W0813 03:48:01.098375 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.098543 kubelet[1983]: E0813 03:48:01.098517 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.099441 kubelet[1983]: E0813 03:48:01.099415 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.099575 kubelet[1983]: W0813 03:48:01.099549 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.099699 kubelet[1983]: E0813 03:48:01.099674 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.100163 kubelet[1983]: E0813 03:48:01.100141 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.100302 kubelet[1983]: W0813 03:48:01.100277 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.100416 kubelet[1983]: E0813 03:48:01.100391 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.100771 kubelet[1983]: E0813 03:48:01.100749 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.100911 kubelet[1983]: W0813 03:48:01.100886 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.101082 kubelet[1983]: E0813 03:48:01.101057 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.101745 kubelet[1983]: E0813 03:48:01.101723 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.101891 kubelet[1983]: W0813 03:48:01.101851 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.102040 kubelet[1983]: E0813 03:48:01.102015 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.103014 kubelet[1983]: E0813 03:48:01.102991 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.103144 kubelet[1983]: W0813 03:48:01.103119 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.103267 kubelet[1983]: E0813 03:48:01.103242 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.103663 kubelet[1983]: E0813 03:48:01.103641 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.103786 kubelet[1983]: W0813 03:48:01.103761 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.103997 kubelet[1983]: E0813 03:48:01.103909 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.107064 kubelet[1983]: E0813 03:48:01.107025 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.107234 kubelet[1983]: W0813 03:48:01.107205 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.107388 kubelet[1983]: E0813 03:48:01.107361 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.109052 kubelet[1983]: E0813 03:48:01.109028 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.109186 kubelet[1983]: W0813 03:48:01.109161 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.109358 kubelet[1983]: E0813 03:48:01.109301 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.111030 kubelet[1983]: E0813 03:48:01.111007 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.111161 kubelet[1983]: W0813 03:48:01.111136 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.111288 kubelet[1983]: E0813 03:48:01.111262 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.111764 kubelet[1983]: E0813 03:48:01.111742 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.111896 kubelet[1983]: W0813 03:48:01.111855 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.112060 kubelet[1983]: E0813 03:48:01.112034 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.112437 kubelet[1983]: E0813 03:48:01.112415 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.112570 kubelet[1983]: W0813 03:48:01.112544 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.112686 kubelet[1983]: E0813 03:48:01.112658 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.113455 kubelet[1983]: E0813 03:48:01.113433 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.113598 kubelet[1983]: W0813 03:48:01.113573 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.113721 kubelet[1983]: E0813 03:48:01.113696 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.114664 kubelet[1983]: E0813 03:48:01.114642 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.114792 kubelet[1983]: W0813 03:48:01.114767 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.114954 kubelet[1983]: E0813 03:48:01.114908 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.115134 kubelet[1983]: I0813 03:48:01.115107 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3-kubelet-dir\") pod \"csi-node-driver-2b9kg\" (UID: \"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3\") " pod="calico-system/csi-node-driver-2b9kg" Aug 13 03:48:01.115471 kubelet[1983]: E0813 03:48:01.115442 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.115471 kubelet[1983]: W0813 03:48:01.115467 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.115612 kubelet[1983]: E0813 03:48:01.115496 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.115793 kubelet[1983]: E0813 03:48:01.115737 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.115793 kubelet[1983]: W0813 03:48:01.115758 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.115793 kubelet[1983]: E0813 03:48:01.115782 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.116071 kubelet[1983]: E0813 03:48:01.116048 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.116071 kubelet[1983]: W0813 03:48:01.116069 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.116209 kubelet[1983]: E0813 03:48:01.116095 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.116209 kubelet[1983]: I0813 03:48:01.116132 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3-socket-dir\") pod \"csi-node-driver-2b9kg\" (UID: \"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3\") " pod="calico-system/csi-node-driver-2b9kg" Aug 13 03:48:01.116953 kubelet[1983]: E0813 03:48:01.116369 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.116953 kubelet[1983]: W0813 03:48:01.116399 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.116953 kubelet[1983]: E0813 03:48:01.116417 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.116953 kubelet[1983]: I0813 03:48:01.116441 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3-registration-dir\") pod \"csi-node-driver-2b9kg\" (UID: \"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3\") " pod="calico-system/csi-node-driver-2b9kg" Aug 13 03:48:01.116953 kubelet[1983]: E0813 03:48:01.116678 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.116953 kubelet[1983]: W0813 03:48:01.116697 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.116953 kubelet[1983]: E0813 03:48:01.116713 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.116953 kubelet[1983]: I0813 03:48:01.116737 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pnthn\" (UniqueName: \"kubernetes.io/projected/4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3-kube-api-access-pnthn\") pod \"csi-node-driver-2b9kg\" (UID: \"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3\") " pod="calico-system/csi-node-driver-2b9kg" Aug 13 03:48:01.117378 kubelet[1983]: E0813 03:48:01.116997 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.117378 kubelet[1983]: W0813 03:48:01.117014 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.117378 kubelet[1983]: E0813 03:48:01.117029 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.117378 kubelet[1983]: I0813 03:48:01.117052 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3-varrun\") pod \"csi-node-driver-2b9kg\" (UID: \"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3\") " pod="calico-system/csi-node-driver-2b9kg" Aug 13 03:48:01.117378 kubelet[1983]: E0813 03:48:01.117342 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.117378 kubelet[1983]: W0813 03:48:01.117358 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.117378 kubelet[1983]: E0813 03:48:01.117374 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.124600 kubelet[1983]: E0813 03:48:01.117590 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.124600 kubelet[1983]: W0813 03:48:01.117604 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.124600 kubelet[1983]: E0813 03:48:01.117619 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.124600 kubelet[1983]: E0813 03:48:01.117852 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.124600 kubelet[1983]: W0813 03:48:01.117878 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.124600 kubelet[1983]: E0813 03:48:01.117904 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.124600 kubelet[1983]: E0813 03:48:01.118134 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.124600 kubelet[1983]: W0813 03:48:01.118148 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.124600 kubelet[1983]: E0813 03:48:01.118163 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.124600 kubelet[1983]: E0813 03:48:01.118381 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.125461 kubelet[1983]: W0813 03:48:01.118394 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.125461 kubelet[1983]: E0813 03:48:01.118410 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.125461 kubelet[1983]: E0813 03:48:01.118647 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.125461 kubelet[1983]: W0813 03:48:01.118661 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.125461 kubelet[1983]: E0813 03:48:01.118678 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.125461 kubelet[1983]: E0813 03:48:01.118905 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.125461 kubelet[1983]: W0813 03:48:01.118921 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.125461 kubelet[1983]: E0813 03:48:01.118959 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.125461 kubelet[1983]: E0813 03:48:01.119182 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.125461 kubelet[1983]: W0813 03:48:01.119196 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.127430 kubelet[1983]: E0813 03:48:01.119211 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.141656 env[1201]: time="2025-08-13T03:48:01.141123042Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dpn84,Uid:2597b433-ced4-47b6-90c2-117e047ff521,Namespace:calico-system,Attempt:0,}" Aug 13 03:48:01.218522 kubelet[1983]: E0813 03:48:01.218478 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.218772 kubelet[1983]: W0813 03:48:01.218741 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.219009 kubelet[1983]: E0813 03:48:01.218967 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.219508 kubelet[1983]: E0813 03:48:01.219485 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.219649 kubelet[1983]: W0813 03:48:01.219622 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.219810 kubelet[1983]: E0813 03:48:01.219783 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.220173 kubelet[1983]: E0813 03:48:01.220142 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.220173 kubelet[1983]: W0813 03:48:01.220170 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.220356 kubelet[1983]: E0813 03:48:01.220200 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.220695 kubelet[1983]: E0813 03:48:01.220650 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.220695 kubelet[1983]: W0813 03:48:01.220671 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.220834 kubelet[1983]: E0813 03:48:01.220696 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.221105 kubelet[1983]: E0813 03:48:01.220983 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.221105 kubelet[1983]: W0813 03:48:01.220999 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.221105 kubelet[1983]: E0813 03:48:01.221014 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.221360 kubelet[1983]: E0813 03:48:01.221307 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.221360 kubelet[1983]: W0813 03:48:01.221330 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.221593 kubelet[1983]: E0813 03:48:01.221561 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.221593 kubelet[1983]: W0813 03:48:01.221589 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.221777 kubelet[1983]: E0813 03:48:01.221559 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.221963 kubelet[1983]: E0813 03:48:01.221809 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.222063 kubelet[1983]: W0813 03:48:01.221964 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.222063 kubelet[1983]: E0813 03:48:01.221983 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.222063 kubelet[1983]: E0813 03:48:01.221819 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.227415 kubelet[1983]: E0813 03:48:01.222240 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.227415 kubelet[1983]: W0813 03:48:01.222254 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.227415 kubelet[1983]: E0813 03:48:01.222280 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.227415 kubelet[1983]: E0813 03:48:01.223283 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.227415 kubelet[1983]: W0813 03:48:01.223303 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.227415 kubelet[1983]: E0813 03:48:01.223329 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.227415 kubelet[1983]: E0813 03:48:01.224540 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.227415 kubelet[1983]: W0813 03:48:01.224557 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.227415 kubelet[1983]: E0813 03:48:01.224603 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.227415 kubelet[1983]: E0813 03:48:01.224842 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.229416 kubelet[1983]: W0813 03:48:01.224859 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.229416 kubelet[1983]: E0813 03:48:01.224909 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.229416 kubelet[1983]: E0813 03:48:01.225162 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.229416 kubelet[1983]: W0813 03:48:01.225176 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.229416 kubelet[1983]: E0813 03:48:01.225211 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.229416 kubelet[1983]: E0813 03:48:01.225469 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.229416 kubelet[1983]: W0813 03:48:01.225484 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.229416 kubelet[1983]: E0813 03:48:01.225508 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.229416 kubelet[1983]: E0813 03:48:01.225780 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.229416 kubelet[1983]: W0813 03:48:01.225795 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.229974 kubelet[1983]: E0813 03:48:01.225819 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.229974 kubelet[1983]: E0813 03:48:01.227588 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.229974 kubelet[1983]: W0813 03:48:01.227604 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.229974 kubelet[1983]: E0813 03:48:01.227726 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.230220 kubelet[1983]: E0813 03:48:01.230061 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.230220 kubelet[1983]: W0813 03:48:01.230079 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.230448 kubelet[1983]: E0813 03:48:01.230407 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.237398 kubelet[1983]: E0813 03:48:01.237339 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.237398 kubelet[1983]: W0813 03:48:01.237377 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.237790 kubelet[1983]: E0813 03:48:01.237757 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.238477 kubelet[1983]: E0813 03:48:01.238410 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.238477 kubelet[1983]: W0813 03:48:01.238441 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.239042 kubelet[1983]: E0813 03:48:01.239013 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.240902 kubelet[1983]: E0813 03:48:01.240079 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.240902 kubelet[1983]: W0813 03:48:01.240097 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.240902 kubelet[1983]: E0813 03:48:01.240119 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.241626 kubelet[1983]: E0813 03:48:01.241589 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.241626 kubelet[1983]: W0813 03:48:01.241613 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.242053 kubelet[1983]: E0813 03:48:01.241827 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.242274 kubelet[1983]: E0813 03:48:01.242032 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.242425 kubelet[1983]: W0813 03:48:01.242397 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.243200 kubelet[1983]: E0813 03:48:01.242848 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.243379 kubelet[1983]: W0813 03:48:01.243351 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.243809 kubelet[1983]: E0813 03:48:01.243786 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.245504 kubelet[1983]: W0813 03:48:01.245472 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.245736 kubelet[1983]: E0813 03:48:01.245704 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.245983 kubelet[1983]: E0813 03:48:01.245934 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.246169 kubelet[1983]: E0813 03:48:01.246135 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.246616 kubelet[1983]: E0813 03:48:01.246593 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.246752 kubelet[1983]: W0813 03:48:01.246724 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.247002 kubelet[1983]: E0813 03:48:01.246975 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.258798 env[1201]: time="2025-08-13T03:48:01.258660166Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:01.259026 env[1201]: time="2025-08-13T03:48:01.258825562Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:01.259026 env[1201]: time="2025-08-13T03:48:01.258909205Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:01.259286 env[1201]: time="2025-08-13T03:48:01.259228514Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f01d36f849a7dceea162aa84b00ec504d383b2c37f4a22e19eef5987d614e631 pid=2482 runtime=io.containerd.runc.v2 Aug 13 03:48:01.291102 kubelet[1983]: E0813 03:48:01.291059 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:01.291336 kubelet[1983]: W0813 03:48:01.291304 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:01.291513 kubelet[1983]: E0813 03:48:01.291484 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:01.294297 env[1201]: time="2025-08-13T03:48:01.294175671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76f785f87b-26shr,Uid:3b320d47-647c-4854-9c17-c1417917e0ff,Namespace:calico-system,Attempt:0,} returns sandbox id \"642fee96efc07867cfab52a8a46ad16f3139470f744089af202fc0472c698998\"" Aug 13 03:48:01.297210 env[1201]: time="2025-08-13T03:48:01.297164858Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.2\"" Aug 13 03:48:01.309786 systemd[1]: Started cri-containerd-f01d36f849a7dceea162aa84b00ec504d383b2c37f4a22e19eef5987d614e631.scope. Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.386000 audit: BPF prog-id=125 op=LOAD Aug 13 03:48:01.388000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.388000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2482 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630316433366638343961376463656561313632616138346230306563 Aug 13 03:48:01.394000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.394000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2482 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630316433366638343961376463656561313632616138346230306563 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.395000 audit: BPF prog-id=126 op=LOAD Aug 13 03:48:01.395000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000347ce0 items=0 ppid=2482 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630316433366638343961376463656561313632616138346230306563 Aug 13 03:48:01.396000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.396000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.396000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.396000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.396000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.396000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.396000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.396000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.396000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.396000 audit: BPF prog-id=127 op=LOAD Aug 13 03:48:01.396000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000347d28 items=0 ppid=2482 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630316433366638343961376463656561313632616138346230306563 Aug 13 03:48:01.397000 audit: BPF prog-id=127 op=UNLOAD Aug 13 03:48:01.397000 audit: BPF prog-id=126 op=UNLOAD Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:01.398000 audit: BPF prog-id=128 op=LOAD Aug 13 03:48:01.398000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b0138 items=0 ppid=2482 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630316433366638343961376463656561313632616138346230306563 Aug 13 03:48:01.437719 env[1201]: time="2025-08-13T03:48:01.437656966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dpn84,Uid:2597b433-ced4-47b6-90c2-117e047ff521,Namespace:calico-system,Attempt:0,} returns sandbox id \"f01d36f849a7dceea162aa84b00ec504d383b2c37f4a22e19eef5987d614e631\"" Aug 13 03:48:01.677000 audit[2529]: NETFILTER_CFG table=filter:97 family=2 entries=21 op=nft_register_rule pid=2529 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:01.677000 audit[2529]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc9ca16060 a2=0 a3=7ffc9ca1604c items=0 ppid=2131 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:01.681000 audit[2529]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2529 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:01.681000 audit[2529]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc9ca16060 a2=0 a3=0 items=0 ppid=2131 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:01.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:01.734522 systemd[1]: run-containerd-runc-k8s.io-642fee96efc07867cfab52a8a46ad16f3139470f744089af202fc0472c698998-runc.qGKL7H.mount: Deactivated successfully. Aug 13 03:48:02.703514 kubelet[1983]: E0813 03:48:02.703428 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:03.077146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2591853703.mount: Deactivated successfully. Aug 13 03:48:04.701995 kubelet[1983]: E0813 03:48:04.700266 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:05.441485 env[1201]: time="2025-08-13T03:48:05.441422165Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:05.444060 env[1201]: time="2025-08-13T03:48:05.444018404Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b3baa600c7ff9cd50dc12f2529ef263aaa346dbeca13c77c6553d661fd216b54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:05.446124 env[1201]: time="2025-08-13T03:48:05.446086874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:05.449625 env[1201]: time="2025-08-13T03:48:05.449414732Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:da29d745efe5eb7d25f765d3aa439f3fe60710a458efe39c285e58b02bd961af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:05.449841 env[1201]: time="2025-08-13T03:48:05.449780337Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.2\" returns image reference \"sha256:b3baa600c7ff9cd50dc12f2529ef263aaa346dbeca13c77c6553d661fd216b54\"" Aug 13 03:48:05.455529 env[1201]: time="2025-08-13T03:48:05.455229030Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Aug 13 03:48:05.482037 env[1201]: time="2025-08-13T03:48:05.481936523Z" level=info msg="CreateContainer within sandbox \"642fee96efc07867cfab52a8a46ad16f3139470f744089af202fc0472c698998\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Aug 13 03:48:05.514509 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3551067216.mount: Deactivated successfully. Aug 13 03:48:05.522036 env[1201]: time="2025-08-13T03:48:05.521769729Z" level=info msg="CreateContainer within sandbox \"642fee96efc07867cfab52a8a46ad16f3139470f744089af202fc0472c698998\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"42f636d6d5f7287945316aa4acb57b3b6578ec6ee7240f67a986e4d8002cf13f\"" Aug 13 03:48:05.526518 env[1201]: time="2025-08-13T03:48:05.523056252Z" level=info msg="StartContainer for \"42f636d6d5f7287945316aa4acb57b3b6578ec6ee7240f67a986e4d8002cf13f\"" Aug 13 03:48:05.559881 systemd[1]: Started cri-containerd-42f636d6d5f7287945316aa4acb57b3b6578ec6ee7240f67a986e4d8002cf13f.scope. Aug 13 03:48:05.609234 kernel: kauditd_printk_skb: 118 callbacks suppressed Aug 13 03:48:05.609477 kernel: audit: type=1400 audit(1755056885.596:998): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.622106 kernel: audit: type=1400 audit(1755056885.596:999): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.622270 kernel: audit: type=1400 audit(1755056885.596:1000): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.632985 kernel: audit: type=1400 audit(1755056885.596:1001): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.639061 kernel: audit: type=1400 audit(1755056885.596:1002): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.645949 kernel: audit: type=1400 audit(1755056885.596:1003): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.657332 kernel: audit: type=1400 audit(1755056885.596:1004): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.657490 kernel: audit: type=1400 audit(1755056885.596:1005): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.657559 kernel: audit: type=1400 audit(1755056885.596:1006): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.667460 kernel: audit: type=1400 audit(1755056885.608:1007): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.608000 audit: BPF prog-id=129 op=LOAD Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2383 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:05.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663633366436643566373238373934353331366161346163623537 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2383 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:05.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663633366436643566373238373934353331366161346163623537 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit: BPF prog-id=130 op=LOAD Aug 13 03:48:05.610000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a8370 items=0 ppid=2383 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:05.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663633366436643566373238373934353331366161346163623537 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit: BPF prog-id=131 op=LOAD Aug 13 03:48:05.610000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a83b8 items=0 ppid=2383 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:05.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663633366436643566373238373934353331366161346163623537 Aug 13 03:48:05.610000 audit: BPF prog-id=131 op=UNLOAD Aug 13 03:48:05.610000 audit: BPF prog-id=130 op=UNLOAD Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:05.610000 audit: BPF prog-id=132 op=LOAD Aug 13 03:48:05.610000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a87c8 items=0 ppid=2383 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:05.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663633366436643566373238373934353331366161346163623537 Aug 13 03:48:05.695670 env[1201]: time="2025-08-13T03:48:05.695528843Z" level=info msg="StartContainer for \"42f636d6d5f7287945316aa4acb57b3b6578ec6ee7240f67a986e4d8002cf13f\" returns successfully" Aug 13 03:48:05.885400 kubelet[1983]: E0813 03:48:05.884027 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.885400 kubelet[1983]: W0813 03:48:05.884072 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.885400 kubelet[1983]: E0813 03:48:05.884105 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.885400 kubelet[1983]: E0813 03:48:05.884462 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.885400 kubelet[1983]: W0813 03:48:05.884490 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.885400 kubelet[1983]: E0813 03:48:05.884507 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.885400 kubelet[1983]: E0813 03:48:05.884788 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.885400 kubelet[1983]: W0813 03:48:05.884804 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.885400 kubelet[1983]: E0813 03:48:05.884821 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.885400 kubelet[1983]: E0813 03:48:05.885163 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.886569 kubelet[1983]: W0813 03:48:05.885179 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.886569 kubelet[1983]: E0813 03:48:05.885195 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.887883 kubelet[1983]: E0813 03:48:05.886799 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.887883 kubelet[1983]: W0813 03:48:05.886819 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.887883 kubelet[1983]: E0813 03:48:05.886849 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.887883 kubelet[1983]: E0813 03:48:05.887161 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.887883 kubelet[1983]: W0813 03:48:05.887175 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.887883 kubelet[1983]: E0813 03:48:05.887191 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.887883 kubelet[1983]: E0813 03:48:05.887459 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.887883 kubelet[1983]: W0813 03:48:05.887474 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.887883 kubelet[1983]: E0813 03:48:05.887489 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.887883 kubelet[1983]: E0813 03:48:05.887730 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.888480 kubelet[1983]: W0813 03:48:05.887756 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.888480 kubelet[1983]: E0813 03:48:05.887772 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.897389 kubelet[1983]: E0813 03:48:05.888791 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.897389 kubelet[1983]: W0813 03:48:05.888807 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.897389 kubelet[1983]: E0813 03:48:05.888833 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.897389 kubelet[1983]: E0813 03:48:05.889226 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.897389 kubelet[1983]: W0813 03:48:05.889242 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.897389 kubelet[1983]: E0813 03:48:05.889258 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.897389 kubelet[1983]: E0813 03:48:05.889506 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.897389 kubelet[1983]: W0813 03:48:05.889533 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.897389 kubelet[1983]: E0813 03:48:05.889551 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.897389 kubelet[1983]: E0813 03:48:05.889792 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.898082 kubelet[1983]: W0813 03:48:05.889817 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.898082 kubelet[1983]: E0813 03:48:05.889833 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.898082 kubelet[1983]: E0813 03:48:05.890284 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.898082 kubelet[1983]: W0813 03:48:05.890300 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.898082 kubelet[1983]: E0813 03:48:05.890330 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.898082 kubelet[1983]: E0813 03:48:05.890607 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.898082 kubelet[1983]: W0813 03:48:05.890623 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.898082 kubelet[1983]: E0813 03:48:05.890638 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.898082 kubelet[1983]: E0813 03:48:05.890888 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.898082 kubelet[1983]: W0813 03:48:05.890914 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.898706 kubelet[1983]: E0813 03:48:05.890992 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.984750 kubelet[1983]: E0813 03:48:05.984601 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.984750 kubelet[1983]: W0813 03:48:05.984643 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.984750 kubelet[1983]: E0813 03:48:05.984675 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.985099 kubelet[1983]: E0813 03:48:05.985074 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.985099 kubelet[1983]: W0813 03:48:05.985090 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.985221 kubelet[1983]: E0813 03:48:05.985114 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.987081 kubelet[1983]: E0813 03:48:05.987044 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.987081 kubelet[1983]: W0813 03:48:05.987068 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.987312 kubelet[1983]: E0813 03:48:05.987088 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.987497 kubelet[1983]: E0813 03:48:05.987467 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.987497 kubelet[1983]: W0813 03:48:05.987491 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.988624 kubelet[1983]: E0813 03:48:05.987732 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.988624 kubelet[1983]: E0813 03:48:05.987736 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.988624 kubelet[1983]: W0813 03:48:05.987753 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.988624 kubelet[1983]: E0813 03:48:05.987875 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.988624 kubelet[1983]: E0813 03:48:05.988115 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.988624 kubelet[1983]: W0813 03:48:05.988454 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.988624 kubelet[1983]: E0813 03:48:05.988487 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.989355 kubelet[1983]: E0813 03:48:05.989192 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.989355 kubelet[1983]: W0813 03:48:05.989213 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.989355 kubelet[1983]: E0813 03:48:05.989240 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.989724 kubelet[1983]: E0813 03:48:05.989700 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.989899 kubelet[1983]: W0813 03:48:05.989872 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.990132 kubelet[1983]: E0813 03:48:05.990085 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.990445 kubelet[1983]: E0813 03:48:05.990422 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.990570 kubelet[1983]: W0813 03:48:05.990545 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.990736 kubelet[1983]: E0813 03:48:05.990699 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.991069 kubelet[1983]: E0813 03:48:05.991046 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.991209 kubelet[1983]: W0813 03:48:05.991183 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.991380 kubelet[1983]: E0813 03:48:05.991348 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.993988 kubelet[1983]: E0813 03:48:05.991681 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.993988 kubelet[1983]: W0813 03:48:05.991706 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.993988 kubelet[1983]: E0813 03:48:05.991820 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.993988 kubelet[1983]: E0813 03:48:05.992640 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.993988 kubelet[1983]: W0813 03:48:05.992656 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.993988 kubelet[1983]: E0813 03:48:05.992680 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.993988 kubelet[1983]: E0813 03:48:05.993015 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.993988 kubelet[1983]: W0813 03:48:05.993032 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.993988 kubelet[1983]: E0813 03:48:05.993136 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.993988 kubelet[1983]: E0813 03:48:05.993520 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.995035 kubelet[1983]: W0813 03:48:05.993535 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.995035 kubelet[1983]: E0813 03:48:05.993644 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.995035 kubelet[1983]: E0813 03:48:05.993816 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.995035 kubelet[1983]: W0813 03:48:05.993831 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.995268 kubelet[1983]: E0813 03:48:05.995164 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.995268 kubelet[1983]: W0813 03:48:05.995181 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.995268 kubelet[1983]: E0813 03:48:05.995199 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.995651 kubelet[1983]: E0813 03:48:05.995463 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.997078 kubelet[1983]: E0813 03:48:05.997050 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.997078 kubelet[1983]: W0813 03:48:05.997073 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.997222 kubelet[1983]: E0813 03:48:05.997091 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:05.997657 kubelet[1983]: E0813 03:48:05.997631 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:05.997657 kubelet[1983]: W0813 03:48:05.997653 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:05.997793 kubelet[1983]: E0813 03:48:05.997670 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.701771 kubelet[1983]: E0813 03:48:06.701574 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:06.818577 kubelet[1983]: I0813 03:48:06.818492 1983 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Aug 13 03:48:06.907151 kubelet[1983]: E0813 03:48:06.906183 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.907151 kubelet[1983]: W0813 03:48:06.906242 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.907151 kubelet[1983]: E0813 03:48:06.906284 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.907151 kubelet[1983]: E0813 03:48:06.906588 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.907151 kubelet[1983]: W0813 03:48:06.906604 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.907151 kubelet[1983]: E0813 03:48:06.906621 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.907151 kubelet[1983]: E0813 03:48:06.906847 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.907151 kubelet[1983]: W0813 03:48:06.906861 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.907151 kubelet[1983]: E0813 03:48:06.906877 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.912545 kubelet[1983]: E0813 03:48:06.908752 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.912545 kubelet[1983]: W0813 03:48:06.908773 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.912545 kubelet[1983]: E0813 03:48:06.908792 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.912545 kubelet[1983]: E0813 03:48:06.909171 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.912545 kubelet[1983]: W0813 03:48:06.909187 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.912545 kubelet[1983]: E0813 03:48:06.909236 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.912545 kubelet[1983]: E0813 03:48:06.909500 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.912545 kubelet[1983]: W0813 03:48:06.909515 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.912545 kubelet[1983]: E0813 03:48:06.909531 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.912545 kubelet[1983]: E0813 03:48:06.909800 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.913294 kubelet[1983]: W0813 03:48:06.909815 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.913294 kubelet[1983]: E0813 03:48:06.909830 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.913294 kubelet[1983]: E0813 03:48:06.910098 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.913294 kubelet[1983]: W0813 03:48:06.910113 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.913294 kubelet[1983]: E0813 03:48:06.910129 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.913294 kubelet[1983]: E0813 03:48:06.910378 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.913294 kubelet[1983]: W0813 03:48:06.910394 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.913294 kubelet[1983]: E0813 03:48:06.910410 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.913294 kubelet[1983]: E0813 03:48:06.910686 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.913294 kubelet[1983]: W0813 03:48:06.910706 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.913830 kubelet[1983]: E0813 03:48:06.910723 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.913830 kubelet[1983]: E0813 03:48:06.911177 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.913830 kubelet[1983]: W0813 03:48:06.911193 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.913830 kubelet[1983]: E0813 03:48:06.911210 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.913830 kubelet[1983]: E0813 03:48:06.911477 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.913830 kubelet[1983]: W0813 03:48:06.911492 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.913830 kubelet[1983]: E0813 03:48:06.911508 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.913830 kubelet[1983]: E0813 03:48:06.911891 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.913830 kubelet[1983]: W0813 03:48:06.911909 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.913830 kubelet[1983]: E0813 03:48:06.912005 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.918038 kubelet[1983]: E0813 03:48:06.917978 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.918300 kubelet[1983]: W0813 03:48:06.918266 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.918467 kubelet[1983]: E0813 03:48:06.918427 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.918870 kubelet[1983]: E0813 03:48:06.918848 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.919013 kubelet[1983]: W0813 03:48:06.918988 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.919157 kubelet[1983]: E0813 03:48:06.919131 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.919994 kubelet[1983]: E0813 03:48:06.919972 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.920841 kubelet[1983]: W0813 03:48:06.920782 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.921121 kubelet[1983]: E0813 03:48:06.921087 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.921853 kubelet[1983]: E0813 03:48:06.921829 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.922007 kubelet[1983]: W0813 03:48:06.921981 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.922148 kubelet[1983]: E0813 03:48:06.922123 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.923281 kubelet[1983]: E0813 03:48:06.923194 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.923281 kubelet[1983]: W0813 03:48:06.923225 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.923462 kubelet[1983]: E0813 03:48:06.923298 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.924634 kubelet[1983]: E0813 03:48:06.923598 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.924634 kubelet[1983]: W0813 03:48:06.923620 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.924832 kubelet[1983]: E0813 03:48:06.924802 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.925283 kubelet[1983]: E0813 03:48:06.925258 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.925473 kubelet[1983]: W0813 03:48:06.925445 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.925767 kubelet[1983]: E0813 03:48:06.925742 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.926056 kubelet[1983]: E0813 03:48:06.926021 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.926176 kubelet[1983]: W0813 03:48:06.926151 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.926411 kubelet[1983]: E0813 03:48:06.926386 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.926613 kubelet[1983]: E0813 03:48:06.926592 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.926742 kubelet[1983]: W0813 03:48:06.926718 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.926996 kubelet[1983]: E0813 03:48:06.926969 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.927213 kubelet[1983]: E0813 03:48:06.927192 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.927353 kubelet[1983]: W0813 03:48:06.927328 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.927489 kubelet[1983]: E0813 03:48:06.927464 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.927991 kubelet[1983]: E0813 03:48:06.927968 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.928199 kubelet[1983]: W0813 03:48:06.928172 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.928341 kubelet[1983]: E0813 03:48:06.928316 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.928833 kubelet[1983]: E0813 03:48:06.928811 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.928988 kubelet[1983]: W0813 03:48:06.928961 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.929153 kubelet[1983]: E0813 03:48:06.929129 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.929878 kubelet[1983]: E0813 03:48:06.929856 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.930062 kubelet[1983]: W0813 03:48:06.930022 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.930194 kubelet[1983]: E0813 03:48:06.930171 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.931266 kubelet[1983]: E0813 03:48:06.931242 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.931395 kubelet[1983]: W0813 03:48:06.931369 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.931645 kubelet[1983]: E0813 03:48:06.931621 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.931840 kubelet[1983]: E0813 03:48:06.931819 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.932002 kubelet[1983]: W0813 03:48:06.931977 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.932193 kubelet[1983]: E0813 03:48:06.932160 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.932527 kubelet[1983]: E0813 03:48:06.932506 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.932652 kubelet[1983]: W0813 03:48:06.932627 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.932813 kubelet[1983]: E0813 03:48:06.932782 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.933290 kubelet[1983]: E0813 03:48:06.933265 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.933451 kubelet[1983]: W0813 03:48:06.933423 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.933608 kubelet[1983]: E0813 03:48:06.933580 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.933915 kubelet[1983]: E0813 03:48:06.933886 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.933915 kubelet[1983]: W0813 03:48:06.933910 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.934141 kubelet[1983]: E0813 03:48:06.933957 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.934577 kubelet[1983]: E0813 03:48:06.934544 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.934577 kubelet[1983]: W0813 03:48:06.934567 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.934728 kubelet[1983]: E0813 03:48:06.934597 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:06.934908 kubelet[1983]: E0813 03:48:06.934881 1983 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 03:48:06.934908 kubelet[1983]: W0813 03:48:06.934902 1983 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 03:48:06.935138 kubelet[1983]: E0813 03:48:06.934919 1983 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 03:48:07.319714 env[1201]: time="2025-08-13T03:48:07.319656244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:07.324119 env[1201]: time="2025-08-13T03:48:07.323992788Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:07.334443 env[1201]: time="2025-08-13T03:48:07.334377079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:07.343145 env[1201]: time="2025-08-13T03:48:07.341691152Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:07.343145 env[1201]: time="2025-08-13T03:48:07.342818076Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Aug 13 03:48:07.350418 env[1201]: time="2025-08-13T03:48:07.350365298Z" level=info msg="CreateContainer within sandbox \"f01d36f849a7dceea162aa84b00ec504d383b2c37f4a22e19eef5987d614e631\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Aug 13 03:48:07.386382 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2747453227.mount: Deactivated successfully. Aug 13 03:48:07.399234 env[1201]: time="2025-08-13T03:48:07.399136918Z" level=info msg="CreateContainer within sandbox \"f01d36f849a7dceea162aa84b00ec504d383b2c37f4a22e19eef5987d614e631\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5a54d4c34811c29cf89d3942bc7deef04fc26d77028c7707508e348051046a5c\"" Aug 13 03:48:07.402213 env[1201]: time="2025-08-13T03:48:07.400297047Z" level=info msg="StartContainer for \"5a54d4c34811c29cf89d3942bc7deef04fc26d77028c7707508e348051046a5c\"" Aug 13 03:48:07.442598 systemd[1]: Started cri-containerd-5a54d4c34811c29cf89d3942bc7deef04fc26d77028c7707508e348051046a5c.scope. Aug 13 03:48:07.467759 systemd[1]: run-containerd-runc-k8s.io-5a54d4c34811c29cf89d3942bc7deef04fc26d77028c7707508e348051046a5c-runc.cJfRDf.mount: Deactivated successfully. Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fb3680d9de8 items=0 ppid=2482 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:07.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561353464346333343831316332396366383964333934326263376465 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit: BPF prog-id=133 op=LOAD Aug 13 03:48:07.494000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00031ef28 items=0 ppid=2482 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:07.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561353464346333343831316332396366383964333934326263376465 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit: BPF prog-id=134 op=LOAD Aug 13 03:48:07.494000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00031ef78 items=0 ppid=2482 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:07.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561353464346333343831316332396366383964333934326263376465 Aug 13 03:48:07.494000 audit: BPF prog-id=134 op=UNLOAD Aug 13 03:48:07.494000 audit: BPF prog-id=133 op=UNLOAD Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:07.494000 audit: BPF prog-id=135 op=LOAD Aug 13 03:48:07.494000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00031f008 items=0 ppid=2482 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:07.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561353464346333343831316332396366383964333934326263376465 Aug 13 03:48:07.541531 env[1201]: time="2025-08-13T03:48:07.541457445Z" level=info msg="StartContainer for \"5a54d4c34811c29cf89d3942bc7deef04fc26d77028c7707508e348051046a5c\" returns successfully" Aug 13 03:48:07.549223 systemd[1]: cri-containerd-5a54d4c34811c29cf89d3942bc7deef04fc26d77028c7707508e348051046a5c.scope: Deactivated successfully. Aug 13 03:48:07.552000 audit: BPF prog-id=135 op=UNLOAD Aug 13 03:48:07.595681 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5a54d4c34811c29cf89d3942bc7deef04fc26d77028c7707508e348051046a5c-rootfs.mount: Deactivated successfully. Aug 13 03:48:07.655568 env[1201]: time="2025-08-13T03:48:07.655363226Z" level=info msg="shim disconnected" id=5a54d4c34811c29cf89d3942bc7deef04fc26d77028c7707508e348051046a5c Aug 13 03:48:07.655909 env[1201]: time="2025-08-13T03:48:07.655863695Z" level=warning msg="cleaning up after shim disconnected" id=5a54d4c34811c29cf89d3942bc7deef04fc26d77028c7707508e348051046a5c namespace=k8s.io Aug 13 03:48:07.656116 env[1201]: time="2025-08-13T03:48:07.656072448Z" level=info msg="cleaning up dead shim" Aug 13 03:48:07.671998 env[1201]: time="2025-08-13T03:48:07.671873242Z" level=warning msg="cleanup warnings time=\"2025-08-13T03:48:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2681 runtime=io.containerd.runc.v2\n" Aug 13 03:48:07.841007 env[1201]: time="2025-08-13T03:48:07.840282692Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Aug 13 03:48:07.869516 kubelet[1983]: I0813 03:48:07.869408 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-76f785f87b-26shr" podStartSLOduration=3.7135306740000003 podStartE2EDuration="7.869364903s" podCreationTimestamp="2025-08-13 03:48:00 +0000 UTC" firstStartedPulling="2025-08-13 03:48:01.296437471 +0000 UTC m=+23.055343250" lastFinishedPulling="2025-08-13 03:48:05.452271701 +0000 UTC m=+27.211177479" observedRunningTime="2025-08-13 03:48:05.848409338 +0000 UTC m=+27.607315128" watchObservedRunningTime="2025-08-13 03:48:07.869364903 +0000 UTC m=+29.628270682" Aug 13 03:48:08.701716 kubelet[1983]: E0813 03:48:08.701657 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:10.704837 kubelet[1983]: E0813 03:48:10.704732 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:12.702373 kubelet[1983]: E0813 03:48:12.701733 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:12.818204 kubelet[1983]: I0813 03:48:12.818119 1983 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Aug 13 03:48:12.986650 kernel: kauditd_printk_skb: 91 callbacks suppressed Aug 13 03:48:12.986920 kernel: audit: type=1325 audit(1755056892.977:1023): table=filter:99 family=2 entries=21 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:12.977000 audit[2701]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:12.977000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe113384c0 a2=0 a3=7ffe113384ac items=0 ppid=2131 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:12.996265 kernel: audit: type=1300 audit(1755056892.977:1023): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe113384c0 a2=0 a3=7ffe113384ac items=0 ppid=2131 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:12.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:13.010127 kernel: audit: type=1327 audit(1755056892.977:1023): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:13.000000 audit[2701]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:13.014985 kernel: audit: type=1325 audit(1755056893.000:1024): table=nat:100 family=2 entries=19 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:13.000000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe113384c0 a2=0 a3=7ffe113384ac items=0 ppid=2131 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:13.030043 kernel: audit: type=1300 audit(1755056893.000:1024): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe113384c0 a2=0 a3=7ffe113384ac items=0 ppid=2131 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:13.030146 kernel: audit: type=1327 audit(1755056893.000:1024): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:13.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:13.589652 env[1201]: time="2025-08-13T03:48:13.589544408Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:13.593862 env[1201]: time="2025-08-13T03:48:13.593816261Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:13.597529 env[1201]: time="2025-08-13T03:48:13.597463402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:13.604919 env[1201]: time="2025-08-13T03:48:13.604844071Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Aug 13 03:48:13.606511 env[1201]: time="2025-08-13T03:48:13.606459145Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:13.613909 env[1201]: time="2025-08-13T03:48:13.613819609Z" level=info msg="CreateContainer within sandbox \"f01d36f849a7dceea162aa84b00ec504d383b2c37f4a22e19eef5987d614e631\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Aug 13 03:48:13.636342 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount655733676.mount: Deactivated successfully. Aug 13 03:48:13.660582 env[1201]: time="2025-08-13T03:48:13.660514223Z" level=info msg="CreateContainer within sandbox \"f01d36f849a7dceea162aa84b00ec504d383b2c37f4a22e19eef5987d614e631\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1dc0846b3cad589b7838c0436e1af43313834406221c599fd16d2d3cd64d1ae0\"" Aug 13 03:48:13.663731 env[1201]: time="2025-08-13T03:48:13.661634650Z" level=info msg="StartContainer for \"1dc0846b3cad589b7838c0436e1af43313834406221c599fd16d2d3cd64d1ae0\"" Aug 13 03:48:13.731762 systemd[1]: run-containerd-runc-k8s.io-1dc0846b3cad589b7838c0436e1af43313834406221c599fd16d2d3cd64d1ae0-runc.Y3cShb.mount: Deactivated successfully. Aug 13 03:48:13.737947 systemd[1]: Started cri-containerd-1dc0846b3cad589b7838c0436e1af43313834406221c599fd16d2d3cd64d1ae0.scope. Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.779485 kernel: audit: type=1400 audit(1755056893.763:1025): avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.779643 kernel: audit: type=1300 audit(1755056893.763:1025): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f59c0c57018 items=0 ppid=2482 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:13.763000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f59c0c57018 items=0 ppid=2482 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:13.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633038343662336361643538396237383338633034333665316166 Aug 13 03:48:13.792363 kernel: audit: type=1327 audit(1755056893.763:1025): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633038343662336361643538396237383338633034333665316166 Aug 13 03:48:13.792484 kernel: audit: type=1400 audit(1755056893.763:1026): avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.763000 audit: BPF prog-id=136 op=LOAD Aug 13 03:48:13.763000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000382ab8 items=0 ppid=2482 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:13.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633038343662336361643538396237383338633034333665316166 Aug 13 03:48:13.765000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.765000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.765000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.765000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.765000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.765000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.765000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.765000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.765000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.765000 audit: BPF prog-id=137 op=LOAD Aug 13 03:48:13.765000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000382b08 items=0 ppid=2482 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:13.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633038343662336361643538396237383338633034333665316166 Aug 13 03:48:13.770000 audit: BPF prog-id=137 op=UNLOAD Aug 13 03:48:13.770000 audit: BPF prog-id=136 op=UNLOAD Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:13.770000 audit: BPF prog-id=138 op=LOAD Aug 13 03:48:13.770000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000382b98 items=0 ppid=2482 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:13.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633038343662336361643538396237383338633034333665316166 Aug 13 03:48:13.815206 env[1201]: time="2025-08-13T03:48:13.815120249Z" level=info msg="StartContainer for \"1dc0846b3cad589b7838c0436e1af43313834406221c599fd16d2d3cd64d1ae0\" returns successfully" Aug 13 03:48:14.702787 kubelet[1983]: E0813 03:48:14.702721 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:14.989026 env[1201]: time="2025-08-13T03:48:14.988826940Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Aug 13 03:48:14.994122 systemd[1]: cri-containerd-1dc0846b3cad589b7838c0436e1af43313834406221c599fd16d2d3cd64d1ae0.scope: Deactivated successfully. Aug 13 03:48:14.998000 audit: BPF prog-id=138 op=UNLOAD Aug 13 03:48:15.027477 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1dc0846b3cad589b7838c0436e1af43313834406221c599fd16d2d3cd64d1ae0-rootfs.mount: Deactivated successfully. Aug 13 03:48:15.034381 env[1201]: time="2025-08-13T03:48:15.034315272Z" level=info msg="shim disconnected" id=1dc0846b3cad589b7838c0436e1af43313834406221c599fd16d2d3cd64d1ae0 Aug 13 03:48:15.034381 env[1201]: time="2025-08-13T03:48:15.034377902Z" level=warning msg="cleaning up after shim disconnected" id=1dc0846b3cad589b7838c0436e1af43313834406221c599fd16d2d3cd64d1ae0 namespace=k8s.io Aug 13 03:48:15.034703 env[1201]: time="2025-08-13T03:48:15.034395355Z" level=info msg="cleaning up dead shim" Aug 13 03:48:15.068950 kubelet[1983]: I0813 03:48:15.051946 1983 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Aug 13 03:48:15.072351 env[1201]: time="2025-08-13T03:48:15.071311878Z" level=warning msg="cleanup warnings time=\"2025-08-13T03:48:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2749 runtime=io.containerd.runc.v2\n" Aug 13 03:48:15.227516 systemd[1]: Created slice kubepods-besteffort-pod397cfc20_a511_4c6d_a598_758c7147b336.slice. Aug 13 03:48:15.240495 systemd[1]: Created slice kubepods-burstable-pod664fd2b9_697f_4cfb_8f6b_6e658389fb36.slice. Aug 13 03:48:15.260563 systemd[1]: Created slice kubepods-besteffort-podc8daecb8_1c68_4bd0_a72a_4fe8be7133c4.slice. Aug 13 03:48:15.282057 systemd[1]: Created slice kubepods-besteffort-pod5f975cc5_b469_4290_aa8b_d31573bf9be5.slice. Aug 13 03:48:15.313746 systemd[1]: Created slice kubepods-besteffort-pod1fef48a6_e8c5_457a_89b1_9453e961f060.slice. Aug 13 03:48:15.330656 kubelet[1983]: I0813 03:48:15.329364 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1fef48a6-e8c5-457a-89b1-9453e961f060-goldmane-ca-bundle\") pod \"goldmane-58fd7646b9-655n6\" (UID: \"1fef48a6-e8c5-457a-89b1-9453e961f060\") " pod="calico-system/goldmane-58fd7646b9-655n6" Aug 13 03:48:15.330656 kubelet[1983]: I0813 03:48:15.329434 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mv42t\" (UniqueName: \"kubernetes.io/projected/9fe0386d-46a6-42bc-9144-c7de082ae8ad-kube-api-access-mv42t\") pod \"calico-apiserver-6bb54c4878-46gtj\" (UID: \"9fe0386d-46a6-42bc-9144-c7de082ae8ad\") " pod="calico-apiserver/calico-apiserver-6bb54c4878-46gtj" Aug 13 03:48:15.330656 kubelet[1983]: I0813 03:48:15.329488 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vk4xf\" (UniqueName: \"kubernetes.io/projected/c8daecb8-1c68-4bd0-a72a-4fe8be7133c4-kube-api-access-vk4xf\") pod \"calico-kube-controllers-8565f784fc-jf5gg\" (UID: \"c8daecb8-1c68-4bd0-a72a-4fe8be7133c4\") " pod="calico-system/calico-kube-controllers-8565f784fc-jf5gg" Aug 13 03:48:15.330656 kubelet[1983]: I0813 03:48:15.329578 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nvws8\" (UniqueName: \"kubernetes.io/projected/dc3d12ad-a6ba-46e6-acbd-9747bea8c699-kube-api-access-nvws8\") pod \"coredns-7c65d6cfc9-t2b6d\" (UID: \"dc3d12ad-a6ba-46e6-acbd-9747bea8c699\") " pod="kube-system/coredns-7c65d6cfc9-t2b6d" Aug 13 03:48:15.330656 kubelet[1983]: I0813 03:48:15.329624 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5xwf9\" (UniqueName: \"kubernetes.io/projected/5f975cc5-b469-4290-aa8b-d31573bf9be5-kube-api-access-5xwf9\") pod \"calico-apiserver-6bb54c4878-2b7lk\" (UID: \"5f975cc5-b469-4290-aa8b-d31573bf9be5\") " pod="calico-apiserver/calico-apiserver-6bb54c4878-2b7lk" Aug 13 03:48:15.341911 kubelet[1983]: I0813 03:48:15.329656 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/1fef48a6-e8c5-457a-89b1-9453e961f060-goldmane-key-pair\") pod \"goldmane-58fd7646b9-655n6\" (UID: \"1fef48a6-e8c5-457a-89b1-9453e961f060\") " pod="calico-system/goldmane-58fd7646b9-655n6" Aug 13 03:48:15.341911 kubelet[1983]: I0813 03:48:15.329689 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/397cfc20-a511-4c6d-a598-758c7147b336-whisker-backend-key-pair\") pod \"whisker-5b8646fc5-27z9b\" (UID: \"397cfc20-a511-4c6d-a598-758c7147b336\") " pod="calico-system/whisker-5b8646fc5-27z9b" Aug 13 03:48:15.341911 kubelet[1983]: I0813 03:48:15.329771 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c8daecb8-1c68-4bd0-a72a-4fe8be7133c4-tigera-ca-bundle\") pod \"calico-kube-controllers-8565f784fc-jf5gg\" (UID: \"c8daecb8-1c68-4bd0-a72a-4fe8be7133c4\") " pod="calico-system/calico-kube-controllers-8565f784fc-jf5gg" Aug 13 03:48:15.341911 kubelet[1983]: I0813 03:48:15.329818 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/1fef48a6-e8c5-457a-89b1-9453e961f060-config\") pod \"goldmane-58fd7646b9-655n6\" (UID: \"1fef48a6-e8c5-457a-89b1-9453e961f060\") " pod="calico-system/goldmane-58fd7646b9-655n6" Aug 13 03:48:15.341911 kubelet[1983]: I0813 03:48:15.329853 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/397cfc20-a511-4c6d-a598-758c7147b336-whisker-ca-bundle\") pod \"whisker-5b8646fc5-27z9b\" (UID: \"397cfc20-a511-4c6d-a598-758c7147b336\") " pod="calico-system/whisker-5b8646fc5-27z9b" Aug 13 03:48:15.337118 systemd[1]: Created slice kubepods-besteffort-pod9fe0386d_46a6_42bc_9144_c7de082ae8ad.slice. Aug 13 03:48:15.342843 kubelet[1983]: I0813 03:48:15.329901 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9fe0386d-46a6-42bc-9144-c7de082ae8ad-calico-apiserver-certs\") pod \"calico-apiserver-6bb54c4878-46gtj\" (UID: \"9fe0386d-46a6-42bc-9144-c7de082ae8ad\") " pod="calico-apiserver/calico-apiserver-6bb54c4878-46gtj" Aug 13 03:48:15.342843 kubelet[1983]: I0813 03:48:15.329951 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kvgh8\" (UniqueName: \"kubernetes.io/projected/397cfc20-a511-4c6d-a598-758c7147b336-kube-api-access-kvgh8\") pod \"whisker-5b8646fc5-27z9b\" (UID: \"397cfc20-a511-4c6d-a598-758c7147b336\") " pod="calico-system/whisker-5b8646fc5-27z9b" Aug 13 03:48:15.342843 kubelet[1983]: I0813 03:48:15.329983 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/664fd2b9-697f-4cfb-8f6b-6e658389fb36-config-volume\") pod \"coredns-7c65d6cfc9-wnjbx\" (UID: \"664fd2b9-697f-4cfb-8f6b-6e658389fb36\") " pod="kube-system/coredns-7c65d6cfc9-wnjbx" Aug 13 03:48:15.342843 kubelet[1983]: I0813 03:48:15.330025 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/dc3d12ad-a6ba-46e6-acbd-9747bea8c699-config-volume\") pod \"coredns-7c65d6cfc9-t2b6d\" (UID: \"dc3d12ad-a6ba-46e6-acbd-9747bea8c699\") " pod="kube-system/coredns-7c65d6cfc9-t2b6d" Aug 13 03:48:15.342843 kubelet[1983]: I0813 03:48:15.330072 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jd7hj\" (UniqueName: \"kubernetes.io/projected/1fef48a6-e8c5-457a-89b1-9453e961f060-kube-api-access-jd7hj\") pod \"goldmane-58fd7646b9-655n6\" (UID: \"1fef48a6-e8c5-457a-89b1-9453e961f060\") " pod="calico-system/goldmane-58fd7646b9-655n6" Aug 13 03:48:15.343167 kubelet[1983]: I0813 03:48:15.330106 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4ncfl\" (UniqueName: \"kubernetes.io/projected/664fd2b9-697f-4cfb-8f6b-6e658389fb36-kube-api-access-4ncfl\") pod \"coredns-7c65d6cfc9-wnjbx\" (UID: \"664fd2b9-697f-4cfb-8f6b-6e658389fb36\") " pod="kube-system/coredns-7c65d6cfc9-wnjbx" Aug 13 03:48:15.343167 kubelet[1983]: I0813 03:48:15.330201 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5f975cc5-b469-4290-aa8b-d31573bf9be5-calico-apiserver-certs\") pod \"calico-apiserver-6bb54c4878-2b7lk\" (UID: \"5f975cc5-b469-4290-aa8b-d31573bf9be5\") " pod="calico-apiserver/calico-apiserver-6bb54c4878-2b7lk" Aug 13 03:48:15.348637 systemd[1]: Created slice kubepods-burstable-poddc3d12ad_a6ba_46e6_acbd_9747bea8c699.slice. Aug 13 03:48:15.539625 env[1201]: time="2025-08-13T03:48:15.539433077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5b8646fc5-27z9b,Uid:397cfc20-a511-4c6d-a598-758c7147b336,Namespace:calico-system,Attempt:0,}" Aug 13 03:48:15.559828 env[1201]: time="2025-08-13T03:48:15.559020318Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-wnjbx,Uid:664fd2b9-697f-4cfb-8f6b-6e658389fb36,Namespace:kube-system,Attempt:0,}" Aug 13 03:48:15.577464 env[1201]: time="2025-08-13T03:48:15.577389849Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8565f784fc-jf5gg,Uid:c8daecb8-1c68-4bd0-a72a-4fe8be7133c4,Namespace:calico-system,Attempt:0,}" Aug 13 03:48:15.597968 env[1201]: time="2025-08-13T03:48:15.597774849Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb54c4878-2b7lk,Uid:5f975cc5-b469-4290-aa8b-d31573bf9be5,Namespace:calico-apiserver,Attempt:0,}" Aug 13 03:48:15.642292 env[1201]: time="2025-08-13T03:48:15.642198808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-655n6,Uid:1fef48a6-e8c5-457a-89b1-9453e961f060,Namespace:calico-system,Attempt:0,}" Aug 13 03:48:15.644314 env[1201]: time="2025-08-13T03:48:15.644273428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb54c4878-46gtj,Uid:9fe0386d-46a6-42bc-9144-c7de082ae8ad,Namespace:calico-apiserver,Attempt:0,}" Aug 13 03:48:15.679400 env[1201]: time="2025-08-13T03:48:15.679204373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-t2b6d,Uid:dc3d12ad-a6ba-46e6-acbd-9747bea8c699,Namespace:kube-system,Attempt:0,}" Aug 13 03:48:15.871601 env[1201]: time="2025-08-13T03:48:15.871433798Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Aug 13 03:48:15.974276 env[1201]: time="2025-08-13T03:48:15.974155463Z" level=error msg="Failed to destroy network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:15.975030 env[1201]: time="2025-08-13T03:48:15.974977651Z" level=error msg="encountered an error cleaning up failed sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:15.975268 env[1201]: time="2025-08-13T03:48:15.975207127Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-wnjbx,Uid:664fd2b9-697f-4cfb-8f6b-6e658389fb36,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:15.979865 kubelet[1983]: E0813 03:48:15.979698 1983 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:15.980975 kubelet[1983]: E0813 03:48:15.980897 1983 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-wnjbx" Aug 13 03:48:15.982130 kubelet[1983]: E0813 03:48:15.982072 1983 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-wnjbx" Aug 13 03:48:15.985063 kubelet[1983]: E0813 03:48:15.984987 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-wnjbx_kube-system(664fd2b9-697f-4cfb-8f6b-6e658389fb36)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-wnjbx_kube-system(664fd2b9-697f-4cfb-8f6b-6e658389fb36)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-wnjbx" podUID="664fd2b9-697f-4cfb-8f6b-6e658389fb36" Aug 13 03:48:16.071277 env[1201]: time="2025-08-13T03:48:16.071170065Z" level=error msg="Failed to destroy network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.072453 env[1201]: time="2025-08-13T03:48:16.072405911Z" level=error msg="encountered an error cleaning up failed sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.072681 env[1201]: time="2025-08-13T03:48:16.072620797Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb54c4878-2b7lk,Uid:5f975cc5-b469-4290-aa8b-d31573bf9be5,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.073484 kubelet[1983]: E0813 03:48:16.073138 1983 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.073484 kubelet[1983]: E0813 03:48:16.073237 1983 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bb54c4878-2b7lk" Aug 13 03:48:16.073484 kubelet[1983]: E0813 03:48:16.073289 1983 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bb54c4878-2b7lk" Aug 13 03:48:16.073717 kubelet[1983]: E0813 03:48:16.073349 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6bb54c4878-2b7lk_calico-apiserver(5f975cc5-b469-4290-aa8b-d31573bf9be5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6bb54c4878-2b7lk_calico-apiserver(5f975cc5-b469-4290-aa8b-d31573bf9be5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bb54c4878-2b7lk" podUID="5f975cc5-b469-4290-aa8b-d31573bf9be5" Aug 13 03:48:16.075469 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934-shm.mount: Deactivated successfully. Aug 13 03:48:16.090841 env[1201]: time="2025-08-13T03:48:16.090669889Z" level=error msg="Failed to destroy network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.094340 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea-shm.mount: Deactivated successfully. Aug 13 03:48:16.100810 env[1201]: time="2025-08-13T03:48:16.100712631Z" level=error msg="encountered an error cleaning up failed sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.101016 env[1201]: time="2025-08-13T03:48:16.100849482Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5b8646fc5-27z9b,Uid:397cfc20-a511-4c6d-a598-758c7147b336,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.101326 kubelet[1983]: E0813 03:48:16.101265 1983 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.101432 kubelet[1983]: E0813 03:48:16.101372 1983 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5b8646fc5-27z9b" Aug 13 03:48:16.101503 kubelet[1983]: E0813 03:48:16.101431 1983 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5b8646fc5-27z9b" Aug 13 03:48:16.101591 kubelet[1983]: E0813 03:48:16.101527 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-5b8646fc5-27z9b_calico-system(397cfc20-a511-4c6d-a598-758c7147b336)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-5b8646fc5-27z9b_calico-system(397cfc20-a511-4c6d-a598-758c7147b336)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5b8646fc5-27z9b" podUID="397cfc20-a511-4c6d-a598-758c7147b336" Aug 13 03:48:16.106492 env[1201]: time="2025-08-13T03:48:16.106415350Z" level=error msg="Failed to destroy network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.110173 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1-shm.mount: Deactivated successfully. Aug 13 03:48:16.114265 env[1201]: time="2025-08-13T03:48:16.114060488Z" level=error msg="encountered an error cleaning up failed sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.114370 env[1201]: time="2025-08-13T03:48:16.114306005Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-655n6,Uid:1fef48a6-e8c5-457a-89b1-9453e961f060,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.115136 kubelet[1983]: E0813 03:48:16.114647 1983 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.115136 kubelet[1983]: E0813 03:48:16.114729 1983 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-58fd7646b9-655n6" Aug 13 03:48:16.115136 kubelet[1983]: E0813 03:48:16.114768 1983 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-58fd7646b9-655n6" Aug 13 03:48:16.115497 kubelet[1983]: E0813 03:48:16.114835 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-58fd7646b9-655n6_calico-system(1fef48a6-e8c5-457a-89b1-9453e961f060)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-58fd7646b9-655n6_calico-system(1fef48a6-e8c5-457a-89b1-9453e961f060)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-58fd7646b9-655n6" podUID="1fef48a6-e8c5-457a-89b1-9453e961f060" Aug 13 03:48:16.143362 env[1201]: time="2025-08-13T03:48:16.143132184Z" level=error msg="Failed to destroy network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.144338 env[1201]: time="2025-08-13T03:48:16.144289848Z" level=error msg="encountered an error cleaning up failed sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.144579 env[1201]: time="2025-08-13T03:48:16.144514569Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8565f784fc-jf5gg,Uid:c8daecb8-1c68-4bd0-a72a-4fe8be7133c4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.147105 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb-shm.mount: Deactivated successfully. Aug 13 03:48:16.150987 kubelet[1983]: E0813 03:48:16.150519 1983 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.150987 kubelet[1983]: E0813 03:48:16.150629 1983 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8565f784fc-jf5gg" Aug 13 03:48:16.150987 kubelet[1983]: E0813 03:48:16.150676 1983 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8565f784fc-jf5gg" Aug 13 03:48:16.151271 kubelet[1983]: E0813 03:48:16.150805 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-8565f784fc-jf5gg_calico-system(c8daecb8-1c68-4bd0-a72a-4fe8be7133c4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-8565f784fc-jf5gg_calico-system(c8daecb8-1c68-4bd0-a72a-4fe8be7133c4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8565f784fc-jf5gg" podUID="c8daecb8-1c68-4bd0-a72a-4fe8be7133c4" Aug 13 03:48:16.168563 env[1201]: time="2025-08-13T03:48:16.168351096Z" level=error msg="Failed to destroy network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.169142 env[1201]: time="2025-08-13T03:48:16.169096919Z" level=error msg="Failed to destroy network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.169946 env[1201]: time="2025-08-13T03:48:16.169885442Z" level=error msg="encountered an error cleaning up failed sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.172740 env[1201]: time="2025-08-13T03:48:16.170482674Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb54c4878-46gtj,Uid:9fe0386d-46a6-42bc-9144-c7de082ae8ad,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.172740 env[1201]: time="2025-08-13T03:48:16.170410636Z" level=error msg="encountered an error cleaning up failed sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.172740 env[1201]: time="2025-08-13T03:48:16.170765460Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-t2b6d,Uid:dc3d12ad-a6ba-46e6-acbd-9747bea8c699,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.173236 kubelet[1983]: E0813 03:48:16.171134 1983 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.173236 kubelet[1983]: E0813 03:48:16.171121 1983 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.173236 kubelet[1983]: E0813 03:48:16.171265 1983 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-t2b6d" Aug 13 03:48:16.173236 kubelet[1983]: E0813 03:48:16.171300 1983 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-t2b6d" Aug 13 03:48:16.173546 kubelet[1983]: E0813 03:48:16.171377 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-t2b6d_kube-system(dc3d12ad-a6ba-46e6-acbd-9747bea8c699)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-t2b6d_kube-system(dc3d12ad-a6ba-46e6-acbd-9747bea8c699)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-t2b6d" podUID="dc3d12ad-a6ba-46e6-acbd-9747bea8c699" Aug 13 03:48:16.173546 kubelet[1983]: E0813 03:48:16.171265 1983 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bb54c4878-46gtj" Aug 13 03:48:16.173546 kubelet[1983]: E0813 03:48:16.171461 1983 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bb54c4878-46gtj" Aug 13 03:48:16.173807 kubelet[1983]: E0813 03:48:16.171575 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6bb54c4878-46gtj_calico-apiserver(9fe0386d-46a6-42bc-9144-c7de082ae8ad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6bb54c4878-46gtj_calico-apiserver(9fe0386d-46a6-42bc-9144-c7de082ae8ad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bb54c4878-46gtj" podUID="9fe0386d-46a6-42bc-9144-c7de082ae8ad" Aug 13 03:48:16.708892 systemd[1]: Created slice kubepods-besteffort-pod4b9bf56a_e8fc_4014_8648_a8e2d4bacaf3.slice. Aug 13 03:48:16.714513 env[1201]: time="2025-08-13T03:48:16.714416017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2b9kg,Uid:4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3,Namespace:calico-system,Attempt:0,}" Aug 13 03:48:16.814700 env[1201]: time="2025-08-13T03:48:16.814612882Z" level=error msg="Failed to destroy network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.815512 env[1201]: time="2025-08-13T03:48:16.815464684Z" level=error msg="encountered an error cleaning up failed sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.815711 env[1201]: time="2025-08-13T03:48:16.815653278Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2b9kg,Uid:4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.819049 kubelet[1983]: E0813 03:48:16.818433 1983 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.819049 kubelet[1983]: E0813 03:48:16.818530 1983 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2b9kg" Aug 13 03:48:16.819049 kubelet[1983]: E0813 03:48:16.818563 1983 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2b9kg" Aug 13 03:48:16.819463 kubelet[1983]: E0813 03:48:16.818646 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2b9kg_calico-system(4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2b9kg_calico-system(4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:16.857340 kubelet[1983]: I0813 03:48:16.857295 1983 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:48:16.864003 kubelet[1983]: I0813 03:48:16.863427 1983 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:16.867998 env[1201]: time="2025-08-13T03:48:16.867946344Z" level=info msg="StopPodSandbox for \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\"" Aug 13 03:48:16.869513 kubelet[1983]: I0813 03:48:16.869463 1983 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:16.871007 env[1201]: time="2025-08-13T03:48:16.870380984Z" level=info msg="StopPodSandbox for \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\"" Aug 13 03:48:16.871155 env[1201]: time="2025-08-13T03:48:16.868541825Z" level=info msg="StopPodSandbox for \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\"" Aug 13 03:48:16.875582 kubelet[1983]: I0813 03:48:16.875543 1983 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:16.878169 env[1201]: time="2025-08-13T03:48:16.878115547Z" level=info msg="StopPodSandbox for \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\"" Aug 13 03:48:16.882193 kubelet[1983]: I0813 03:48:16.882151 1983 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:16.883134 env[1201]: time="2025-08-13T03:48:16.883090399Z" level=info msg="StopPodSandbox for \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\"" Aug 13 03:48:16.887440 kubelet[1983]: I0813 03:48:16.887402 1983 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:16.890867 env[1201]: time="2025-08-13T03:48:16.890778000Z" level=info msg="StopPodSandbox for \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\"" Aug 13 03:48:16.893440 kubelet[1983]: I0813 03:48:16.892567 1983 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:16.893756 env[1201]: time="2025-08-13T03:48:16.893715722Z" level=info msg="StopPodSandbox for \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\"" Aug 13 03:48:16.896316 kubelet[1983]: I0813 03:48:16.896280 1983 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:16.898453 env[1201]: time="2025-08-13T03:48:16.898408554Z" level=info msg="StopPodSandbox for \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\"" Aug 13 03:48:16.960802 env[1201]: time="2025-08-13T03:48:16.960643942Z" level=error msg="StopPodSandbox for \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\" failed" error="failed to destroy network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:16.962566 kubelet[1983]: E0813 03:48:16.962509 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:16.966666 kubelet[1983]: E0813 03:48:16.962595 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea"} Aug 13 03:48:16.966820 kubelet[1983]: E0813 03:48:16.966693 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"397cfc20-a511-4c6d-a598-758c7147b336\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:16.966820 kubelet[1983]: E0813 03:48:16.966733 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"397cfc20-a511-4c6d-a598-758c7147b336\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5b8646fc5-27z9b" podUID="397cfc20-a511-4c6d-a598-758c7147b336" Aug 13 03:48:17.020393 env[1201]: time="2025-08-13T03:48:17.020303456Z" level=error msg="StopPodSandbox for \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\" failed" error="failed to destroy network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:17.021017 kubelet[1983]: E0813 03:48:17.020957 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:17.021515 kubelet[1983]: E0813 03:48:17.021035 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344"} Aug 13 03:48:17.021515 kubelet[1983]: E0813 03:48:17.021085 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:17.021515 kubelet[1983]: E0813 03:48:17.021146 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2b9kg" podUID="4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3" Aug 13 03:48:17.028596 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5-shm.mount: Deactivated successfully. Aug 13 03:48:17.028769 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3-shm.mount: Deactivated successfully. Aug 13 03:48:17.089602 env[1201]: time="2025-08-13T03:48:17.089517815Z" level=error msg="StopPodSandbox for \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\" failed" error="failed to destroy network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:17.090518 kubelet[1983]: E0813 03:48:17.090454 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:17.099407 kubelet[1983]: E0813 03:48:17.090537 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5"} Aug 13 03:48:17.099407 kubelet[1983]: E0813 03:48:17.090598 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dc3d12ad-a6ba-46e6-acbd-9747bea8c699\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:17.099407 kubelet[1983]: E0813 03:48:17.090640 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dc3d12ad-a6ba-46e6-acbd-9747bea8c699\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-t2b6d" podUID="dc3d12ad-a6ba-46e6-acbd-9747bea8c699" Aug 13 03:48:17.099407 kubelet[1983]: E0813 03:48:17.096320 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:17.099407 kubelet[1983]: E0813 03:48:17.096381 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3"} Aug 13 03:48:17.099862 env[1201]: time="2025-08-13T03:48:17.096016083Z" level=error msg="StopPodSandbox for \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\" failed" error="failed to destroy network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:17.099862 env[1201]: time="2025-08-13T03:48:17.098599573Z" level=error msg="StopPodSandbox for \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\" failed" error="failed to destroy network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:17.100048 kubelet[1983]: E0813 03:48:17.096431 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9fe0386d-46a6-42bc-9144-c7de082ae8ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:17.100048 kubelet[1983]: E0813 03:48:17.096472 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9fe0386d-46a6-42bc-9144-c7de082ae8ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bb54c4878-46gtj" podUID="9fe0386d-46a6-42bc-9144-c7de082ae8ad" Aug 13 03:48:17.100048 kubelet[1983]: E0813 03:48:17.098786 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:17.100048 kubelet[1983]: E0813 03:48:17.098847 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1"} Aug 13 03:48:17.100363 kubelet[1983]: E0813 03:48:17.098894 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1fef48a6-e8c5-457a-89b1-9453e961f060\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:17.100363 kubelet[1983]: E0813 03:48:17.098949 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1fef48a6-e8c5-457a-89b1-9453e961f060\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-58fd7646b9-655n6" podUID="1fef48a6-e8c5-457a-89b1-9453e961f060" Aug 13 03:48:17.133023 env[1201]: time="2025-08-13T03:48:17.132903970Z" level=error msg="StopPodSandbox for \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\" failed" error="failed to destroy network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:17.133844 kubelet[1983]: E0813 03:48:17.133599 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:48:17.133844 kubelet[1983]: E0813 03:48:17.133689 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b"} Aug 13 03:48:17.133844 kubelet[1983]: E0813 03:48:17.133741 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"664fd2b9-697f-4cfb-8f6b-6e658389fb36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:17.133844 kubelet[1983]: E0813 03:48:17.133785 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"664fd2b9-697f-4cfb-8f6b-6e658389fb36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-wnjbx" podUID="664fd2b9-697f-4cfb-8f6b-6e658389fb36" Aug 13 03:48:17.134654 env[1201]: time="2025-08-13T03:48:17.134607870Z" level=error msg="StopPodSandbox for \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\" failed" error="failed to destroy network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:17.135164 kubelet[1983]: E0813 03:48:17.135007 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:17.135164 kubelet[1983]: E0813 03:48:17.135054 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934"} Aug 13 03:48:17.135164 kubelet[1983]: E0813 03:48:17.135094 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5f975cc5-b469-4290-aa8b-d31573bf9be5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:17.135164 kubelet[1983]: E0813 03:48:17.135124 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5f975cc5-b469-4290-aa8b-d31573bf9be5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bb54c4878-2b7lk" podUID="5f975cc5-b469-4290-aa8b-d31573bf9be5" Aug 13 03:48:17.144065 env[1201]: time="2025-08-13T03:48:17.143956755Z" level=error msg="StopPodSandbox for \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\" failed" error="failed to destroy network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:17.144748 kubelet[1983]: E0813 03:48:17.144657 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:17.144845 kubelet[1983]: E0813 03:48:17.144765 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb"} Aug 13 03:48:17.144942 kubelet[1983]: E0813 03:48:17.144838 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c8daecb8-1c68-4bd0-a72a-4fe8be7133c4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:17.144942 kubelet[1983]: E0813 03:48:17.144890 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c8daecb8-1c68-4bd0-a72a-4fe8be7133c4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8565f784fc-jf5gg" podUID="c8daecb8-1c68-4bd0-a72a-4fe8be7133c4" Aug 13 03:48:28.593632 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4280276209.mount: Deactivated successfully. Aug 13 03:48:28.669890 env[1201]: time="2025-08-13T03:48:28.669719728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:28.674135 env[1201]: time="2025-08-13T03:48:28.674081727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:28.676011 env[1201]: time="2025-08-13T03:48:28.675971403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:28.683954 env[1201]: time="2025-08-13T03:48:28.683884300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:28.688320 env[1201]: time="2025-08-13T03:48:28.687554062Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Aug 13 03:48:28.732629 env[1201]: time="2025-08-13T03:48:28.732322201Z" level=info msg="CreateContainer within sandbox \"f01d36f849a7dceea162aa84b00ec504d383b2c37f4a22e19eef5987d614e631\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Aug 13 03:48:28.753265 env[1201]: time="2025-08-13T03:48:28.753188491Z" level=info msg="StopPodSandbox for \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\"" Aug 13 03:48:28.791440 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3597860008.mount: Deactivated successfully. Aug 13 03:48:28.801519 env[1201]: time="2025-08-13T03:48:28.800287019Z" level=info msg="CreateContainer within sandbox \"f01d36f849a7dceea162aa84b00ec504d383b2c37f4a22e19eef5987d614e631\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82\"" Aug 13 03:48:28.802736 env[1201]: time="2025-08-13T03:48:28.802697143Z" level=info msg="StartContainer for \"f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82\"" Aug 13 03:48:28.850940 env[1201]: time="2025-08-13T03:48:28.848841079Z" level=error msg="StopPodSandbox for \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\" failed" error="failed to destroy network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:28.851127 kubelet[1983]: E0813 03:48:28.849271 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:48:28.851127 kubelet[1983]: E0813 03:48:28.849426 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b"} Aug 13 03:48:28.851127 kubelet[1983]: E0813 03:48:28.849515 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"664fd2b9-697f-4cfb-8f6b-6e658389fb36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:28.851127 kubelet[1983]: E0813 03:48:28.849556 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"664fd2b9-697f-4cfb-8f6b-6e658389fb36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-wnjbx" podUID="664fd2b9-697f-4cfb-8f6b-6e658389fb36" Aug 13 03:48:28.869125 systemd[1]: Started cri-containerd-f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82.scope. Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.939056 kernel: kauditd_printk_skb: 40 callbacks suppressed Aug 13 03:48:28.941064 kernel: audit: type=1400 audit(1755056908.927:1032): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.942475 kernel: audit: type=1300 audit(1755056908.927:1032): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6609581718 items=0 ppid=2482 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:28.927000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6609581718 items=0 ppid=2482 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:28.966784 kernel: audit: type=1327 audit(1755056908.927:1032): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639386334663337363538646231623963666630623136316139643761 Aug 13 03:48:28.967011 kernel: audit: type=1400 audit(1755056908.927:1033): avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639386334663337363538646231623963666630623136316139643761 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.973956 kernel: audit: type=1400 audit(1755056908.927:1033): avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.981048 kernel: audit: type=1400 audit(1755056908.927:1033): avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.981218 kernel: audit: type=1400 audit(1755056908.927:1033): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.991351 kernel: audit: type=1400 audit(1755056908.927:1033): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.991467 kernel: audit: type=1400 audit(1755056908.927:1033): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.998963 kernel: audit: type=1400 audit(1755056908.927:1033): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.927000 audit: BPF prog-id=139 op=LOAD Aug 13 03:48:28.927000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000384ac8 items=0 ppid=2482 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:28.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639386334663337363538646231623963666630623136316139643761 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit: BPF prog-id=140 op=LOAD Aug 13 03:48:28.928000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000384b18 items=0 ppid=2482 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:28.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639386334663337363538646231623963666630623136316139643761 Aug 13 03:48:28.928000 audit: BPF prog-id=140 op=UNLOAD Aug 13 03:48:28.928000 audit: BPF prog-id=139 op=UNLOAD Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:28.928000 audit: BPF prog-id=141 op=LOAD Aug 13 03:48:28.928000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000384ba8 items=0 ppid=2482 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:28.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639386334663337363538646231623963666630623136316139643761 Aug 13 03:48:29.076295 env[1201]: time="2025-08-13T03:48:29.076040006Z" level=info msg="StartContainer for \"f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82\" returns successfully" Aug 13 03:48:29.704359 env[1201]: time="2025-08-13T03:48:29.702001196Z" level=info msg="StopPodSandbox for \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\"" Aug 13 03:48:29.761099 env[1201]: time="2025-08-13T03:48:29.761010096Z" level=error msg="StopPodSandbox for \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\" failed" error="failed to destroy network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 03:48:29.761961 kubelet[1983]: E0813 03:48:29.761689 1983 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:29.762190 kubelet[1983]: E0813 03:48:29.761980 1983 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea"} Aug 13 03:48:29.762190 kubelet[1983]: E0813 03:48:29.762133 1983 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"397cfc20-a511-4c6d-a598-758c7147b336\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 03:48:29.762458 kubelet[1983]: E0813 03:48:29.762198 1983 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"397cfc20-a511-4c6d-a598-758c7147b336\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5b8646fc5-27z9b" podUID="397cfc20-a511-4c6d-a598-758c7147b336" Aug 13 03:48:29.882573 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Aug 13 03:48:29.882794 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Aug 13 03:48:30.028652 systemd[1]: run-containerd-runc-k8s.io-f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82-runc.5MgYwq.mount: Deactivated successfully. Aug 13 03:48:30.078619 kubelet[1983]: I0813 03:48:30.074772 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-dpn84" podStartSLOduration=2.822363201 podStartE2EDuration="30.072886605s" podCreationTimestamp="2025-08-13 03:48:00 +0000 UTC" firstStartedPulling="2025-08-13 03:48:01.439637321 +0000 UTC m=+23.198543094" lastFinishedPulling="2025-08-13 03:48:28.69016072 +0000 UTC m=+50.449066498" observedRunningTime="2025-08-13 03:48:30.071911138 +0000 UTC m=+51.830816944" watchObservedRunningTime="2025-08-13 03:48:30.072886605 +0000 UTC m=+51.831792391" Aug 13 03:48:30.315836 env[1201]: time="2025-08-13T03:48:30.315676887Z" level=info msg="StopPodSandbox for \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\"" Aug 13 03:48:30.702324 env[1201]: time="2025-08-13T03:48:30.702263695Z" level=info msg="StopPodSandbox for \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\"" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.546 [INFO][3226] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.547 [INFO][3226] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" iface="eth0" netns="/var/run/netns/cni-88d31edc-0b19-3037-9614-58f10fdbc727" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.547 [INFO][3226] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" iface="eth0" netns="/var/run/netns/cni-88d31edc-0b19-3037-9614-58f10fdbc727" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.548 [INFO][3226] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" iface="eth0" netns="/var/run/netns/cni-88d31edc-0b19-3037-9614-58f10fdbc727" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.548 [INFO][3226] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.548 [INFO][3226] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.858 [INFO][3234] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" HandleID="k8s-pod-network.af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.865 [INFO][3234] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.866 [INFO][3234] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.878 [WARNING][3234] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" HandleID="k8s-pod-network.af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.878 [INFO][3234] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" HandleID="k8s-pod-network.af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.882 [INFO][3234] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:30.890504 env[1201]: 2025-08-13 03:48:30.886 [INFO][3226] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:30.894792 systemd[1]: run-netns-cni\x2d88d31edc\x2d0b19\x2d3037\x2d9614\x2d58f10fdbc727.mount: Deactivated successfully. Aug 13 03:48:30.898847 env[1201]: time="2025-08-13T03:48:30.897389882Z" level=info msg="TearDown network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\" successfully" Aug 13 03:48:30.898847 env[1201]: time="2025-08-13T03:48:30.897463643Z" level=info msg="StopPodSandbox for \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\" returns successfully" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.824 [INFO][3250] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.824 [INFO][3250] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" iface="eth0" netns="/var/run/netns/cni-ada6c273-2515-c5b5-4e9c-f0a2dde2f728" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.826 [INFO][3250] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" iface="eth0" netns="/var/run/netns/cni-ada6c273-2515-c5b5-4e9c-f0a2dde2f728" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.827 [INFO][3250] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" iface="eth0" netns="/var/run/netns/cni-ada6c273-2515-c5b5-4e9c-f0a2dde2f728" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.827 [INFO][3250] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.827 [INFO][3250] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.874 [INFO][3266] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" HandleID="k8s-pod-network.cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.874 [INFO][3266] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.882 [INFO][3266] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.903 [WARNING][3266] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" HandleID="k8s-pod-network.cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.903 [INFO][3266] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" HandleID="k8s-pod-network.cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.909 [INFO][3266] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:30.920907 env[1201]: 2025-08-13 03:48:30.917 [INFO][3250] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:30.927138 env[1201]: time="2025-08-13T03:48:30.924469354Z" level=info msg="TearDown network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\" successfully" Aug 13 03:48:30.927138 env[1201]: time="2025-08-13T03:48:30.924530123Z" level=info msg="StopPodSandbox for \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\" returns successfully" Aug 13 03:48:30.927138 env[1201]: time="2025-08-13T03:48:30.926495374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2b9kg,Uid:4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3,Namespace:calico-system,Attempt:1,}" Aug 13 03:48:30.924284 systemd[1]: run-netns-cni\x2dada6c273\x2d2515\x2dc5b5\x2d4e9c\x2df0a2dde2f728.mount: Deactivated successfully. Aug 13 03:48:31.093444 kubelet[1983]: I0813 03:48:31.092906 1983 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/397cfc20-a511-4c6d-a598-758c7147b336-whisker-ca-bundle\") pod \"397cfc20-a511-4c6d-a598-758c7147b336\" (UID: \"397cfc20-a511-4c6d-a598-758c7147b336\") " Aug 13 03:48:31.093444 kubelet[1983]: I0813 03:48:31.093027 1983 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-kvgh8\" (UniqueName: \"kubernetes.io/projected/397cfc20-a511-4c6d-a598-758c7147b336-kube-api-access-kvgh8\") pod \"397cfc20-a511-4c6d-a598-758c7147b336\" (UID: \"397cfc20-a511-4c6d-a598-758c7147b336\") " Aug 13 03:48:31.093444 kubelet[1983]: I0813 03:48:31.093070 1983 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/397cfc20-a511-4c6d-a598-758c7147b336-whisker-backend-key-pair\") pod \"397cfc20-a511-4c6d-a598-758c7147b336\" (UID: \"397cfc20-a511-4c6d-a598-758c7147b336\") " Aug 13 03:48:31.105194 kubelet[1983]: I0813 03:48:31.101850 1983 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/397cfc20-a511-4c6d-a598-758c7147b336-kube-api-access-kvgh8" (OuterVolumeSpecName: "kube-api-access-kvgh8") pod "397cfc20-a511-4c6d-a598-758c7147b336" (UID: "397cfc20-a511-4c6d-a598-758c7147b336"). InnerVolumeSpecName "kube-api-access-kvgh8". PluginName "kubernetes.io/projected", VolumeGidValue "" Aug 13 03:48:31.105520 kubelet[1983]: I0813 03:48:31.101117 1983 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/397cfc20-a511-4c6d-a598-758c7147b336-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "397cfc20-a511-4c6d-a598-758c7147b336" (UID: "397cfc20-a511-4c6d-a598-758c7147b336"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Aug 13 03:48:31.110262 kubelet[1983]: I0813 03:48:31.110223 1983 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/397cfc20-a511-4c6d-a598-758c7147b336-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "397cfc20-a511-4c6d-a598-758c7147b336" (UID: "397cfc20-a511-4c6d-a598-758c7147b336"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" Aug 13 03:48:31.194122 kubelet[1983]: I0813 03:48:31.194067 1983 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/397cfc20-a511-4c6d-a598-758c7147b336-whisker-backend-key-pair\") on node \"srv-amtey.gb1.brightbox.com\" DevicePath \"\"" Aug 13 03:48:31.194122 kubelet[1983]: I0813 03:48:31.194123 1983 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/397cfc20-a511-4c6d-a598-758c7147b336-whisker-ca-bundle\") on node \"srv-amtey.gb1.brightbox.com\" DevicePath \"\"" Aug 13 03:48:31.194727 kubelet[1983]: I0813 03:48:31.194143 1983 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-kvgh8\" (UniqueName: \"kubernetes.io/projected/397cfc20-a511-4c6d-a598-758c7147b336-kube-api-access-kvgh8\") on node \"srv-amtey.gb1.brightbox.com\" DevicePath \"\"" Aug 13 03:48:31.212022 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 03:48:31.216080 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3587375792b: link becomes ready Aug 13 03:48:31.218513 systemd-networkd[1026]: cali3587375792b: Link UP Aug 13 03:48:31.219627 systemd-networkd[1026]: cali3587375792b: Gained carrier Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:30.980 [INFO][3278] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.005 [INFO][3278] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0 csi-node-driver- calico-system 4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3 898 0 2025-08-13 03:48:00 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:57bd658777 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-amtey.gb1.brightbox.com csi-node-driver-2b9kg eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3587375792b [] [] }} ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Namespace="calico-system" Pod="csi-node-driver-2b9kg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.005 [INFO][3278] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Namespace="calico-system" Pod="csi-node-driver-2b9kg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.078 [INFO][3299] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" HandleID="k8s-pod-network.094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.078 [INFO][3299] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" HandleID="k8s-pod-network.094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002df600), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-amtey.gb1.brightbox.com", "pod":"csi-node-driver-2b9kg", "timestamp":"2025-08-13 03:48:31.078386916 +0000 UTC"}, Hostname:"srv-amtey.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.078 [INFO][3299] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.079 [INFO][3299] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.079 [INFO][3299] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-amtey.gb1.brightbox.com' Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.099 [INFO][3299] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.123 [INFO][3299] ipam/ipam.go 394: Looking up existing affinities for host host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.141 [INFO][3299] ipam/ipam.go 511: Trying affinity for 192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.145 [INFO][3299] ipam/ipam.go 158: Attempting to load block cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.149 [INFO][3299] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.149 [INFO][3299] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.70.64/26 handle="k8s-pod-network.094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.152 [INFO][3299] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7 Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.161 [INFO][3299] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.70.64/26 handle="k8s-pod-network.094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.183 [INFO][3299] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.70.65/26] block=192.168.70.64/26 handle="k8s-pod-network.094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.183 [INFO][3299] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.70.65/26] handle="k8s-pod-network.094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.183 [INFO][3299] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:31.248284 env[1201]: 2025-08-13 03:48:31.183 [INFO][3299] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.70.65/26] IPv6=[] ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" HandleID="k8s-pod-network.094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:31.254071 env[1201]: 2025-08-13 03:48:31.186 [INFO][3278] cni-plugin/k8s.go 418: Populated endpoint ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Namespace="calico-system" Pod="csi-node-driver-2b9kg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-2b9kg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.70.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3587375792b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:31.254071 env[1201]: 2025-08-13 03:48:31.186 [INFO][3278] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.70.65/32] ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Namespace="calico-system" Pod="csi-node-driver-2b9kg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:31.254071 env[1201]: 2025-08-13 03:48:31.186 [INFO][3278] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3587375792b ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Namespace="calico-system" Pod="csi-node-driver-2b9kg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:31.254071 env[1201]: 2025-08-13 03:48:31.219 [INFO][3278] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Namespace="calico-system" Pod="csi-node-driver-2b9kg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:31.254071 env[1201]: 2025-08-13 03:48:31.223 [INFO][3278] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Namespace="calico-system" Pod="csi-node-driver-2b9kg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7", Pod:"csi-node-driver-2b9kg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.70.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3587375792b", MAC:"a6:80:51:92:33:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:31.254071 env[1201]: 2025-08-13 03:48:31.245 [INFO][3278] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7" Namespace="calico-system" Pod="csi-node-driver-2b9kg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:31.279699 env[1201]: time="2025-08-13T03:48:31.279213477Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:31.279699 env[1201]: time="2025-08-13T03:48:31.279307242Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:31.279699 env[1201]: time="2025-08-13T03:48:31.279329555Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:31.280365 env[1201]: time="2025-08-13T03:48:31.280245127Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7 pid=3333 runtime=io.containerd.runc.v2 Aug 13 03:48:31.300517 systemd[1]: Removed slice kubepods-besteffort-pod397cfc20_a511_4c6d_a598_758c7147b336.slice. Aug 13 03:48:31.327206 systemd[1]: Started cri-containerd-094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7.scope. Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.365000 audit: BPF prog-id=142 op=LOAD Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3333 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:31.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346438636638656334366631616333343735303365643665663761 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3333 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:31.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346438636638656334366631616333343735303365643665663761 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit: BPF prog-id=143 op=LOAD Aug 13 03:48:31.366000 audit[3345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000366860 items=0 ppid=3333 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:31.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346438636638656334366631616333343735303365643665663761 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit: BPF prog-id=144 op=LOAD Aug 13 03:48:31.366000 audit[3345]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003668a8 items=0 ppid=3333 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:31.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346438636638656334366631616333343735303365643665663761 Aug 13 03:48:31.366000 audit: BPF prog-id=144 op=UNLOAD Aug 13 03:48:31.366000 audit: BPF prog-id=143 op=UNLOAD Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:31.366000 audit: BPF prog-id=145 op=LOAD Aug 13 03:48:31.366000 audit[3345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000366cb8 items=0 ppid=3333 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:31.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346438636638656334366631616333343735303365643665663761 Aug 13 03:48:31.402543 env[1201]: time="2025-08-13T03:48:31.402479117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2b9kg,Uid:4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3,Namespace:calico-system,Attempt:1,} returns sandbox id \"094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7\"" Aug 13 03:48:31.405187 env[1201]: time="2025-08-13T03:48:31.405147151Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Aug 13 03:48:31.453310 systemd[1]: Created slice kubepods-besteffort-podce85b396_40d7_4f1e_b14b_6ab9b8501411.slice. Aug 13 03:48:31.561000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:31.561000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024d1ea0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:48:31.561000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:48:31.561000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:31.561000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011e6390 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:48:31.561000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:48:31.597042 kubelet[1983]: I0813 03:48:31.596910 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ce85b396-40d7-4f1e-b14b-6ab9b8501411-whisker-ca-bundle\") pod \"whisker-5565b65ff7-z429c\" (UID: \"ce85b396-40d7-4f1e-b14b-6ab9b8501411\") " pod="calico-system/whisker-5565b65ff7-z429c" Aug 13 03:48:31.597514 kubelet[1983]: I0813 03:48:31.597401 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zd72t\" (UniqueName: \"kubernetes.io/projected/ce85b396-40d7-4f1e-b14b-6ab9b8501411-kube-api-access-zd72t\") pod \"whisker-5565b65ff7-z429c\" (UID: \"ce85b396-40d7-4f1e-b14b-6ab9b8501411\") " pod="calico-system/whisker-5565b65ff7-z429c" Aug 13 03:48:31.597731 kubelet[1983]: I0813 03:48:31.597701 1983 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/ce85b396-40d7-4f1e-b14b-6ab9b8501411-whisker-backend-key-pair\") pod \"whisker-5565b65ff7-z429c\" (UID: \"ce85b396-40d7-4f1e-b14b-6ab9b8501411\") " pod="calico-system/whisker-5565b65ff7-z429c" Aug 13 03:48:31.703296 env[1201]: time="2025-08-13T03:48:31.703234211Z" level=info msg="StopPodSandbox for \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\"" Aug 13 03:48:31.706959 env[1201]: time="2025-08-13T03:48:31.703820410Z" level=info msg="StopPodSandbox for \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\"" Aug 13 03:48:31.706959 env[1201]: time="2025-08-13T03:48:31.704143937Z" level=info msg="StopPodSandbox for \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\"" Aug 13 03:48:31.758888 env[1201]: time="2025-08-13T03:48:31.758064582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5565b65ff7-z429c,Uid:ce85b396-40d7-4f1e-b14b-6ab9b8501411,Namespace:calico-system,Attempt:0,}" Aug 13 03:48:31.899438 systemd[1]: run-containerd-runc-k8s.io-f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82-runc.XVRQuJ.mount: Deactivated successfully. Aug 13 03:48:31.899607 systemd[1]: var-lib-kubelet-pods-397cfc20\x2da511\x2d4c6d\x2da598\x2d758c7147b336-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dkvgh8.mount: Deactivated successfully. Aug 13 03:48:31.899712 systemd[1]: var-lib-kubelet-pods-397cfc20\x2da511\x2d4c6d\x2da598\x2d758c7147b336-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Aug 13 03:48:32.096000 audit[3498]: AVC avc: denied { write } for pid=3498 comm="tee" name="fd" dev="proc" ino=29543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 03:48:32.096000 audit[3498]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeab84b7b6 a2=241 a3=1b6 items=1 ppid=3443 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:32.100000 audit[3487]: AVC avc: denied { write } for pid=3487 comm="tee" name="fd" dev="proc" ino=30444 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 03:48:32.110000 audit[3500]: AVC avc: denied { write } for pid=3500 comm="tee" name="fd" dev="proc" ino=29549 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 03:48:32.110000 audit[3500]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc373ef7c6 a2=241 a3=1b6 items=1 ppid=3439 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:32.110000 audit: CWD cwd="/etc/service/enabled/bird/log" Aug 13 03:48:32.110000 audit: PATH item=0 name="/dev/fd/63" inode=29540 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:48:32.110000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 03:48:32.096000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Aug 13 03:48:32.096000 audit: PATH item=0 name="/dev/fd/63" inode=30437 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:48:32.096000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 03:48:32.100000 audit[3487]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe536567b5 a2=241 a3=1b6 items=1 ppid=3433 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:32.100000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:31.960 [INFO][3403] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:31.960 [INFO][3403] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" iface="eth0" netns="/var/run/netns/cni-a053b30c-3b34-9b25-f6b1-c31017a0c85d" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:31.960 [INFO][3403] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" iface="eth0" netns="/var/run/netns/cni-a053b30c-3b34-9b25-f6b1-c31017a0c85d" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:31.961 [INFO][3403] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" iface="eth0" netns="/var/run/netns/cni-a053b30c-3b34-9b25-f6b1-c31017a0c85d" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:31.961 [INFO][3403] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:31.961 [INFO][3403] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:32.115 [INFO][3461] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" HandleID="k8s-pod-network.7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:32.123 [INFO][3461] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:32.123 [INFO][3461] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:32.137 [WARNING][3461] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" HandleID="k8s-pod-network.7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:32.137 [INFO][3461] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" HandleID="k8s-pod-network.7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:32.145 [INFO][3461] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:32.155525 env[1201]: 2025-08-13 03:48:32.150 [INFO][3403] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:32.161206 env[1201]: time="2025-08-13T03:48:32.160189624Z" level=info msg="TearDown network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\" successfully" Aug 13 03:48:32.161206 env[1201]: time="2025-08-13T03:48:32.160240893Z" level=info msg="StopPodSandbox for \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\" returns successfully" Aug 13 03:48:32.158809 systemd[1]: run-netns-cni\x2da053b30c\x2d3b34\x2d9b25\x2df6b1\x2dc31017a0c85d.mount: Deactivated successfully. Aug 13 03:48:32.161864 env[1201]: time="2025-08-13T03:48:32.161433625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb54c4878-46gtj,Uid:9fe0386d-46a6-42bc-9144-c7de082ae8ad,Namespace:calico-apiserver,Attempt:1,}" Aug 13 03:48:32.100000 audit: PATH item=0 name="/dev/fd/63" inode=30429 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:48:32.100000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 03:48:32.166000 audit[3493]: AVC avc: denied { write } for pid=3493 comm="tee" name="fd" dev="proc" ino=30471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 03:48:32.166000 audit[3493]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4ed8b7c5 a2=241 a3=1b6 items=1 ppid=3434 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:32.166000 audit: CWD cwd="/etc/service/enabled/bird6/log" Aug 13 03:48:32.166000 audit: PATH item=0 name="/dev/fd/63" inode=30434 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:48:32.166000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 03:48:32.181000 audit[3508]: AVC avc: denied { write } for pid=3508 comm="tee" name="fd" dev="proc" ino=30475 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.041 [INFO][3397] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.041 [INFO][3397] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" iface="eth0" netns="/var/run/netns/cni-fe98d2ff-8e7d-6d34-3125-68d8c1be7853" Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.044 [INFO][3397] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" iface="eth0" netns="/var/run/netns/cni-fe98d2ff-8e7d-6d34-3125-68d8c1be7853" Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.044 [INFO][3397] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" iface="eth0" netns="/var/run/netns/cni-fe98d2ff-8e7d-6d34-3125-68d8c1be7853" Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.044 [INFO][3397] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.044 [INFO][3397] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.149 [INFO][3480] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" HandleID="k8s-pod-network.a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.150 [INFO][3480] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.150 [INFO][3480] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.168 [WARNING][3480] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" HandleID="k8s-pod-network.a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.168 [INFO][3480] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" HandleID="k8s-pod-network.a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.185 [INFO][3480] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:32.198960 env[1201]: 2025-08-13 03:48:32.188 [INFO][3397] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:32.199151 systemd[1]: run-netns-cni\x2dfe98d2ff\x2d8e7d\x2d6d34\x2d3125\x2d68d8c1be7853.mount: Deactivated successfully. Aug 13 03:48:32.201461 env[1201]: time="2025-08-13T03:48:32.200013294Z" level=info msg="TearDown network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\" successfully" Aug 13 03:48:32.201461 env[1201]: time="2025-08-13T03:48:32.200067084Z" level=info msg="StopPodSandbox for \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\" returns successfully" Aug 13 03:48:32.201619 env[1201]: time="2025-08-13T03:48:32.201548846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-t2b6d,Uid:dc3d12ad-a6ba-46e6-acbd-9747bea8c699,Namespace:kube-system,Attempt:1,}" Aug 13 03:48:32.220000 audit[3515]: AVC avc: denied { write } for pid=3515 comm="tee" name="fd" dev="proc" ino=30536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 03:48:32.220000 audit[3515]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc6fdd7c7 a2=241 a3=1b6 items=1 ppid=3450 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:32.220000 audit: CWD cwd="/etc/service/enabled/cni/log" Aug 13 03:48:32.220000 audit: PATH item=0 name="/dev/fd/63" inode=30470 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:48:32.220000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 03:48:32.181000 audit[3508]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5e6727c5 a2=241 a3=1b6 items=1 ppid=3445 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:32.181000 audit: CWD cwd="/etc/service/enabled/confd/log" Aug 13 03:48:32.181000 audit: PATH item=0 name="/dev/fd/63" inode=30449 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:48:32.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 03:48:32.242000 audit[3510]: AVC avc: denied { write } for pid=3510 comm="tee" name="fd" dev="proc" ino=29582 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 03:48:32.242000 audit[3510]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd31ad57c5 a2=241 a3=1b6 items=1 ppid=3435 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:32.242000 audit: CWD cwd="/etc/service/enabled/felix/log" Aug 13 03:48:32.242000 audit: PATH item=0 name="/dev/fd/63" inode=30453 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:48:32.242000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.004 [INFO][3398] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.004 [INFO][3398] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" iface="eth0" netns="/var/run/netns/cni-c34e66e1-f41e-53c2-ce38-63c4098403ca" Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.004 [INFO][3398] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" iface="eth0" netns="/var/run/netns/cni-c34e66e1-f41e-53c2-ce38-63c4098403ca" Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.008 [INFO][3398] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" iface="eth0" netns="/var/run/netns/cni-c34e66e1-f41e-53c2-ce38-63c4098403ca" Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.008 [INFO][3398] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.008 [INFO][3398] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.223 [INFO][3469] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" HandleID="k8s-pod-network.d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.225 [INFO][3469] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.225 [INFO][3469] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.237 [WARNING][3469] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" HandleID="k8s-pod-network.d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.238 [INFO][3469] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" HandleID="k8s-pod-network.d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.240 [INFO][3469] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:32.261214 env[1201]: 2025-08-13 03:48:32.245 [INFO][3398] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:32.262245 env[1201]: time="2025-08-13T03:48:32.261366638Z" level=info msg="TearDown network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\" successfully" Aug 13 03:48:32.262245 env[1201]: time="2025-08-13T03:48:32.261421345Z" level=info msg="StopPodSandbox for \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\" returns successfully" Aug 13 03:48:32.265703 env[1201]: time="2025-08-13T03:48:32.265658153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8565f784fc-jf5gg,Uid:c8daecb8-1c68-4bd0-a72a-4fe8be7133c4,Namespace:calico-system,Attempt:1,}" Aug 13 03:48:32.459529 systemd-networkd[1026]: cali3319ac05ee4: Link UP Aug 13 03:48:32.473595 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 03:48:32.473820 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3319ac05ee4: link becomes ready Aug 13 03:48:32.477447 systemd-networkd[1026]: cali3319ac05ee4: Gained carrier Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:31.947 [INFO][3411] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.009 [INFO][3411] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0 whisker-5565b65ff7- calico-system ce85b396-40d7-4f1e-b14b-6ab9b8501411 919 0 2025-08-13 03:48:31 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:5565b65ff7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-amtey.gb1.brightbox.com whisker-5565b65ff7-z429c eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali3319ac05ee4 [] [] }} ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Namespace="calico-system" Pod="whisker-5565b65ff7-z429c" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.010 [INFO][3411] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Namespace="calico-system" Pod="whisker-5565b65ff7-z429c" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.287 [INFO][3474] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" HandleID="k8s-pod-network.aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.293 [INFO][3474] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" HandleID="k8s-pod-network.aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000320140), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-amtey.gb1.brightbox.com", "pod":"whisker-5565b65ff7-z429c", "timestamp":"2025-08-13 03:48:32.28202653 +0000 UTC"}, Hostname:"srv-amtey.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.294 [INFO][3474] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.298 [INFO][3474] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.298 [INFO][3474] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-amtey.gb1.brightbox.com' Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.332 [INFO][3474] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.374 [INFO][3474] ipam/ipam.go 394: Looking up existing affinities for host host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.390 [INFO][3474] ipam/ipam.go 511: Trying affinity for 192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.403 [INFO][3474] ipam/ipam.go 158: Attempting to load block cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.416 [INFO][3474] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.416 [INFO][3474] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.70.64/26 handle="k8s-pod-network.aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.423 [INFO][3474] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320 Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.436 [INFO][3474] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.70.64/26 handle="k8s-pod-network.aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.451 [INFO][3474] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.70.66/26] block=192.168.70.64/26 handle="k8s-pod-network.aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.451 [INFO][3474] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.70.66/26] handle="k8s-pod-network.aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.451 [INFO][3474] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:32.544802 env[1201]: 2025-08-13 03:48:32.451 [INFO][3474] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.70.66/26] IPv6=[] ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" HandleID="k8s-pod-network.aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" Aug 13 03:48:32.546287 env[1201]: 2025-08-13 03:48:32.455 [INFO][3411] cni-plugin/k8s.go 418: Populated endpoint ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Namespace="calico-system" Pod="whisker-5565b65ff7-z429c" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0", GenerateName:"whisker-5565b65ff7-", Namespace:"calico-system", SelfLink:"", UID:"ce85b396-40d7-4f1e-b14b-6ab9b8501411", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5565b65ff7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"", Pod:"whisker-5565b65ff7-z429c", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.70.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali3319ac05ee4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:32.546287 env[1201]: 2025-08-13 03:48:32.455 [INFO][3411] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.70.66/32] ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Namespace="calico-system" Pod="whisker-5565b65ff7-z429c" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" Aug 13 03:48:32.546287 env[1201]: 2025-08-13 03:48:32.455 [INFO][3411] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3319ac05ee4 ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Namespace="calico-system" Pod="whisker-5565b65ff7-z429c" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" Aug 13 03:48:32.546287 env[1201]: 2025-08-13 03:48:32.491 [INFO][3411] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Namespace="calico-system" Pod="whisker-5565b65ff7-z429c" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" Aug 13 03:48:32.546287 env[1201]: 2025-08-13 03:48:32.494 [INFO][3411] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Namespace="calico-system" Pod="whisker-5565b65ff7-z429c" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0", GenerateName:"whisker-5565b65ff7-", Namespace:"calico-system", SelfLink:"", UID:"ce85b396-40d7-4f1e-b14b-6ab9b8501411", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5565b65ff7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320", Pod:"whisker-5565b65ff7-z429c", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.70.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali3319ac05ee4", MAC:"2e:62:3d:16:d6:14", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:32.546287 env[1201]: 2025-08-13 03:48:32.531 [INFO][3411] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320" Namespace="calico-system" Pod="whisker-5565b65ff7-z429c" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5565b65ff7--z429c-eth0" Aug 13 03:48:32.627432 env[1201]: time="2025-08-13T03:48:32.627243105Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:32.627663 env[1201]: time="2025-08-13T03:48:32.627465148Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:32.627663 env[1201]: time="2025-08-13T03:48:32.627526822Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:32.628086 env[1201]: time="2025-08-13T03:48:32.627996022Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320 pid=3597 runtime=io.containerd.runc.v2 Aug 13 03:48:32.640277 systemd-networkd[1026]: cali3587375792b: Gained IPv6LL Aug 13 03:48:32.707220 env[1201]: time="2025-08-13T03:48:32.707160015Z" level=info msg="StopPodSandbox for \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\"" Aug 13 03:48:32.708106 env[1201]: time="2025-08-13T03:48:32.708069899Z" level=info msg="StopPodSandbox for \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\"" Aug 13 03:48:32.724259 kubelet[1983]: I0813 03:48:32.721949 1983 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="397cfc20-a511-4c6d-a598-758c7147b336" path="/var/lib/kubelet/pods/397cfc20-a511-4c6d-a598-758c7147b336/volumes" Aug 13 03:48:32.885357 systemd-networkd[1026]: cali91363ec9514: Link UP Aug 13 03:48:32.887365 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali91363ec9514: link becomes ready Aug 13 03:48:32.899354 systemd[1]: run-netns-cni\x2dc34e66e1\x2df41e\x2d53c2\x2dce38\x2d63c4098403ca.mount: Deactivated successfully. Aug 13 03:48:32.901059 systemd-networkd[1026]: cali91363ec9514: Gained carrier Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.392 [INFO][3536] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.534 [INFO][3536] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0 coredns-7c65d6cfc9- kube-system dc3d12ad-a6ba-46e6-acbd-9747bea8c699 926 0 2025-08-13 03:47:42 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-amtey.gb1.brightbox.com coredns-7c65d6cfc9-t2b6d eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali91363ec9514 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Namespace="kube-system" Pod="coredns-7c65d6cfc9-t2b6d" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.534 [INFO][3536] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Namespace="kube-system" Pod="coredns-7c65d6cfc9-t2b6d" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.739 [INFO][3599] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" HandleID="k8s-pod-network.f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.740 [INFO][3599] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" HandleID="k8s-pod-network.f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cdae0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-amtey.gb1.brightbox.com", "pod":"coredns-7c65d6cfc9-t2b6d", "timestamp":"2025-08-13 03:48:32.739747698 +0000 UTC"}, Hostname:"srv-amtey.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.740 [INFO][3599] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.742 [INFO][3599] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.742 [INFO][3599] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-amtey.gb1.brightbox.com' Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.759 [INFO][3599] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.791 [INFO][3599] ipam/ipam.go 394: Looking up existing affinities for host host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.803 [INFO][3599] ipam/ipam.go 511: Trying affinity for 192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.815 [INFO][3599] ipam/ipam.go 158: Attempting to load block cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.831 [INFO][3599] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.831 [INFO][3599] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.70.64/26 handle="k8s-pod-network.f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.834 [INFO][3599] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83 Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.841 [INFO][3599] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.70.64/26 handle="k8s-pod-network.f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.852 [INFO][3599] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.70.67/26] block=192.168.70.64/26 handle="k8s-pod-network.f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.853 [INFO][3599] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.70.67/26] handle="k8s-pod-network.f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.853 [INFO][3599] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:32.975749 env[1201]: 2025-08-13 03:48:32.853 [INFO][3599] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.70.67/26] IPv6=[] ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" HandleID="k8s-pod-network.f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.990949 env[1201]: 2025-08-13 03:48:32.855 [INFO][3536] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Namespace="kube-system" Pod="coredns-7c65d6cfc9-t2b6d" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"dc3d12ad-a6ba-46e6-acbd-9747bea8c699", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7c65d6cfc9-t2b6d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.70.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali91363ec9514", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:32.990949 env[1201]: 2025-08-13 03:48:32.855 [INFO][3536] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.70.67/32] ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Namespace="kube-system" Pod="coredns-7c65d6cfc9-t2b6d" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.990949 env[1201]: 2025-08-13 03:48:32.855 [INFO][3536] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali91363ec9514 ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Namespace="kube-system" Pod="coredns-7c65d6cfc9-t2b6d" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.990949 env[1201]: 2025-08-13 03:48:32.912 [INFO][3536] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Namespace="kube-system" Pod="coredns-7c65d6cfc9-t2b6d" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.990949 env[1201]: 2025-08-13 03:48:32.912 [INFO][3536] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Namespace="kube-system" Pod="coredns-7c65d6cfc9-t2b6d" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"dc3d12ad-a6ba-46e6-acbd-9747bea8c699", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83", Pod:"coredns-7c65d6cfc9-t2b6d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.70.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali91363ec9514", MAC:"4e:47:cf:a6:f2:51", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:32.990949 env[1201]: 2025-08-13 03:48:32.963 [INFO][3536] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83" Namespace="kube-system" Pod="coredns-7c65d6cfc9-t2b6d" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:32.983909 systemd[1]: run-containerd-runc-k8s.io-aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320-runc.9zRtZ5.mount: Deactivated successfully. Aug 13 03:48:33.011266 systemd[1]: Started cri-containerd-aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320.scope. Aug 13 03:48:33.141659 env[1201]: time="2025-08-13T03:48:33.141539635Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:33.146505 env[1201]: time="2025-08-13T03:48:33.141919076Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:33.146806 env[1201]: time="2025-08-13T03:48:33.146748825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:33.207085 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3bf184aa226: link becomes ready Aug 13 03:48:33.201640 systemd-networkd[1026]: cali3bf184aa226: Link UP Aug 13 03:48:33.208296 systemd-networkd[1026]: cali3bf184aa226: Gained carrier Aug 13 03:48:33.209526 env[1201]: time="2025-08-13T03:48:33.208483726Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83 pid=3676 runtime=io.containerd.runc.v2 Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:32.462 [INFO][3526] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:32.552 [INFO][3526] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0 calico-apiserver-6bb54c4878- calico-apiserver 9fe0386d-46a6-42bc-9144-c7de082ae8ad 924 0 2025-08-13 03:47:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bb54c4878 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-amtey.gb1.brightbox.com calico-apiserver-6bb54c4878-46gtj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3bf184aa226 [] [] }} ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-46gtj" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:32.552 [INFO][3526] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-46gtj" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:32.998 [INFO][3605] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" HandleID="k8s-pod-network.e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:32.999 [INFO][3605] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" HandleID="k8s-pod-network.e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd0b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-amtey.gb1.brightbox.com", "pod":"calico-apiserver-6bb54c4878-46gtj", "timestamp":"2025-08-13 03:48:32.996571582 +0000 UTC"}, Hostname:"srv-amtey.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:32.999 [INFO][3605] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:32.999 [INFO][3605] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:32.999 [INFO][3605] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-amtey.gb1.brightbox.com' Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.044 [INFO][3605] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.078 [INFO][3605] ipam/ipam.go 394: Looking up existing affinities for host host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.107 [INFO][3605] ipam/ipam.go 511: Trying affinity for 192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.122 [INFO][3605] ipam/ipam.go 158: Attempting to load block cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.132 [INFO][3605] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.132 [INFO][3605] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.70.64/26 handle="k8s-pod-network.e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.144 [INFO][3605] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186 Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.157 [INFO][3605] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.70.64/26 handle="k8s-pod-network.e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.181 [INFO][3605] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.70.68/26] block=192.168.70.64/26 handle="k8s-pod-network.e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.181 [INFO][3605] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.70.68/26] handle="k8s-pod-network.e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.181 [INFO][3605] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:33.273401 env[1201]: 2025-08-13 03:48:33.181 [INFO][3605] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.70.68/26] IPv6=[] ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" HandleID="k8s-pod-network.e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:33.276384 env[1201]: 2025-08-13 03:48:33.184 [INFO][3526] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-46gtj" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0", GenerateName:"calico-apiserver-6bb54c4878-", Namespace:"calico-apiserver", SelfLink:"", UID:"9fe0386d-46a6-42bc-9144-c7de082ae8ad", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb54c4878", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-6bb54c4878-46gtj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3bf184aa226", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:33.276384 env[1201]: 2025-08-13 03:48:33.184 [INFO][3526] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.70.68/32] ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-46gtj" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:33.276384 env[1201]: 2025-08-13 03:48:33.184 [INFO][3526] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3bf184aa226 ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-46gtj" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:33.276384 env[1201]: 2025-08-13 03:48:33.215 [INFO][3526] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-46gtj" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:33.276384 env[1201]: 2025-08-13 03:48:33.216 [INFO][3526] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-46gtj" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0", GenerateName:"calico-apiserver-6bb54c4878-", Namespace:"calico-apiserver", SelfLink:"", UID:"9fe0386d-46a6-42bc-9144-c7de082ae8ad", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb54c4878", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186", Pod:"calico-apiserver-6bb54c4878-46gtj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3bf184aa226", MAC:"76:d6:8b:b5:ce:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:33.276384 env[1201]: 2025-08-13 03:48:33.251 [INFO][3526] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-46gtj" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:33.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.300000 audit: BPF prog-id=146 op=LOAD Aug 13 03:48:33.301000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.301000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3597 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663734666334386634323338316265306164643735323930373939 Aug 13 03:48:33.301000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.301000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3597 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663734666334386634323338316265306164643735323930373939 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit: BPF prog-id=147 op=LOAD Aug 13 03:48:33.302000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00038ec60 items=0 ppid=3597 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663734666334386634323338316265306164643735323930373939 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit: BPF prog-id=148 op=LOAD Aug 13 03:48:33.302000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00038eca8 items=0 ppid=3597 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663734666334386634323338316265306164643735323930373939 Aug 13 03:48:33.302000 audit: BPF prog-id=148 op=UNLOAD Aug 13 03:48:33.302000 audit: BPF prog-id=147 op=UNLOAD Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.302000 audit: BPF prog-id=149 op=LOAD Aug 13 03:48:33.302000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00038f0b8 items=0 ppid=3597 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663734666334386634323338316265306164643735323930373939 Aug 13 03:48:33.313000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:33.313000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c010080780 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:48:33.313000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:48:33.318000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:33.318000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0100807b0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:48:33.318000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:33.318000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0104d2c20 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:48:33.318000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:48:33.318000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:48:33.319000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:33.319000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0100807e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:48:33.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:48:33.368554 systemd[1]: Started cri-containerd-f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83.scope. Aug 13 03:48:33.414174 env[1201]: time="2025-08-13T03:48:33.414032506Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:33.414875 env[1201]: time="2025-08-13T03:48:33.414793870Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:33.417125 env[1201]: time="2025-08-13T03:48:33.417065189Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:33.417862 env[1201]: time="2025-08-13T03:48:33.417810515Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186 pid=3735 runtime=io.containerd.runc.v2 Aug 13 03:48:33.440000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:33.440000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0101cf710 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:48:33.440000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:48:33.444000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:33.444000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c011cbb180 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:48:33.444000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.453000 audit: BPF prog-id=150 op=LOAD Aug 13 03:48:33.464000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.464000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3676 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313839636639383736303832333835616462346139356561356166 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3676 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.477050 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 03:48:33.477161 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali152afc2ea8c: link becomes ready Aug 13 03:48:33.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313839636639383736303832333835616462346139356561356166 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.468000 audit: BPF prog-id=151 op=LOAD Aug 13 03:48:33.468000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00025fce0 items=0 ppid=3676 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313839636639383736303832333835616462346139356561356166 Aug 13 03:48:33.470000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.470000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.470000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.470000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.470000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.470000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.470000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.470000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.470000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.470000 audit: BPF prog-id=152 op=LOAD Aug 13 03:48:33.475662 systemd-networkd[1026]: cali152afc2ea8c: Link UP Aug 13 03:48:33.476072 systemd-networkd[1026]: cali152afc2ea8c: Gained carrier Aug 13 03:48:33.470000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00025fd28 items=0 ppid=3676 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313839636639383736303832333835616462346139356561356166 Aug 13 03:48:33.485000 audit: BPF prog-id=152 op=UNLOAD Aug 13 03:48:33.485000 audit: BPF prog-id=151 op=UNLOAD Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.485000 audit: BPF prog-id=153 op=LOAD Aug 13 03:48:33.485000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003e0138 items=0 ppid=3676 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313839636639383736303832333835616462346139356561356166 Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.166 [INFO][3645] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.166 [INFO][3645] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" iface="eth0" netns="/var/run/netns/cni-20468e27-007a-0b87-afed-646a4046f2e1" Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.166 [INFO][3645] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" iface="eth0" netns="/var/run/netns/cni-20468e27-007a-0b87-afed-646a4046f2e1" Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.166 [INFO][3645] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" iface="eth0" netns="/var/run/netns/cni-20468e27-007a-0b87-afed-646a4046f2e1" Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.166 [INFO][3645] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.166 [INFO][3645] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.316 [INFO][3692] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" HandleID="k8s-pod-network.b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.317 [INFO][3692] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.452 [INFO][3692] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.499 [WARNING][3692] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" HandleID="k8s-pod-network.b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.499 [INFO][3692] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" HandleID="k8s-pod-network.b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.524 [INFO][3692] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:33.544707 env[1201]: 2025-08-13 03:48:33.529 [INFO][3645] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:33.546210 env[1201]: time="2025-08-13T03:48:33.546144115Z" level=info msg="TearDown network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\" successfully" Aug 13 03:48:33.546367 env[1201]: time="2025-08-13T03:48:33.546330392Z" level=info msg="StopPodSandbox for \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\" returns successfully" Aug 13 03:48:33.547631 env[1201]: time="2025-08-13T03:48:33.547586610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb54c4878-2b7lk,Uid:5f975cc5-b469-4290-aa8b-d31573bf9be5,Namespace:calico-apiserver,Attempt:1,}" Aug 13 03:48:33.579157 systemd[1]: Started cri-containerd-e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186.scope. Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:32.414 [INFO][3561] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:32.528 [INFO][3561] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0 calico-kube-controllers-8565f784fc- calico-system c8daecb8-1c68-4bd0-a72a-4fe8be7133c4 925 0 2025-08-13 03:48:01 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:8565f784fc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-amtey.gb1.brightbox.com calico-kube-controllers-8565f784fc-jf5gg eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali152afc2ea8c [] [] }} ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Namespace="calico-system" Pod="calico-kube-controllers-8565f784fc-jf5gg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:32.544 [INFO][3561] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Namespace="calico-system" Pod="calico-kube-controllers-8565f784fc-jf5gg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.016 [INFO][3585] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" HandleID="k8s-pod-network.7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.017 [INFO][3585] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" HandleID="k8s-pod-network.7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032a140), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-amtey.gb1.brightbox.com", "pod":"calico-kube-controllers-8565f784fc-jf5gg", "timestamp":"2025-08-13 03:48:33.015849531 +0000 UTC"}, Hostname:"srv-amtey.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.017 [INFO][3585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.182 [INFO][3585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.182 [INFO][3585] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-amtey.gb1.brightbox.com' Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.239 [INFO][3585] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.259 [INFO][3585] ipam/ipam.go 394: Looking up existing affinities for host host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.276 [INFO][3585] ipam/ipam.go 511: Trying affinity for 192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.287 [INFO][3585] ipam/ipam.go 158: Attempting to load block cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.303 [INFO][3585] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.304 [INFO][3585] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.70.64/26 handle="k8s-pod-network.7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.375 [INFO][3585] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.400 [INFO][3585] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.70.64/26 handle="k8s-pod-network.7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.445 [INFO][3585] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.70.69/26] block=192.168.70.64/26 handle="k8s-pod-network.7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.451 [INFO][3585] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.70.69/26] handle="k8s-pod-network.7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.451 [INFO][3585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:33.602528 env[1201]: 2025-08-13 03:48:33.451 [INFO][3585] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.70.69/26] IPv6=[] ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" HandleID="k8s-pod-network.7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:33.604035 env[1201]: 2025-08-13 03:48:33.460 [INFO][3561] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Namespace="calico-system" Pod="calico-kube-controllers-8565f784fc-jf5gg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0", GenerateName:"calico-kube-controllers-8565f784fc-", Namespace:"calico-system", SelfLink:"", UID:"c8daecb8-1c68-4bd0-a72a-4fe8be7133c4", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8565f784fc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-8565f784fc-jf5gg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.70.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali152afc2ea8c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:33.604035 env[1201]: 2025-08-13 03:48:33.461 [INFO][3561] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.70.69/32] ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Namespace="calico-system" Pod="calico-kube-controllers-8565f784fc-jf5gg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:33.604035 env[1201]: 2025-08-13 03:48:33.461 [INFO][3561] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali152afc2ea8c ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Namespace="calico-system" Pod="calico-kube-controllers-8565f784fc-jf5gg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:33.604035 env[1201]: 2025-08-13 03:48:33.487 [INFO][3561] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Namespace="calico-system" Pod="calico-kube-controllers-8565f784fc-jf5gg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:33.604035 env[1201]: 2025-08-13 03:48:33.488 [INFO][3561] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Namespace="calico-system" Pod="calico-kube-controllers-8565f784fc-jf5gg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0", GenerateName:"calico-kube-controllers-8565f784fc-", Namespace:"calico-system", SelfLink:"", UID:"c8daecb8-1c68-4bd0-a72a-4fe8be7133c4", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8565f784fc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f", Pod:"calico-kube-controllers-8565f784fc-jf5gg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.70.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali152afc2ea8c", MAC:"b2:2b:b6:be:46:4a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:33.604035 env[1201]: 2025-08-13 03:48:33.587 [INFO][3561] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f" Namespace="calico-system" Pod="calico-kube-controllers-8565f784fc-jf5gg" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:33.640482 env[1201]: time="2025-08-13T03:48:33.640403929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5565b65ff7-z429c,Uid:ce85b396-40d7-4f1e-b14b-6ab9b8501411,Namespace:calico-system,Attempt:0,} returns sandbox id \"aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320\"" Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.687000 audit: BPF prog-id=154 op=LOAD Aug 13 03:48:33.689000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.689000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3735 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323239316139656665633138636233613330313736333331326130 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3735 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323239316139656665633138636233613330313736333331326130 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit: BPF prog-id=155 op=LOAD Aug 13 03:48:33.696000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000241f70 items=0 ppid=3735 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323239316139656665633138636233613330313736333331326130 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit: BPF prog-id=156 op=LOAD Aug 13 03:48:33.696000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000241fb8 items=0 ppid=3735 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323239316139656665633138636233613330313736333331326130 Aug 13 03:48:33.696000 audit: BPF prog-id=156 op=UNLOAD Aug 13 03:48:33.696000 audit: BPF prog-id=155 op=UNLOAD Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:33.696000 audit: BPF prog-id=157 op=LOAD Aug 13 03:48:33.696000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003b83c8 items=0 ppid=3735 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:33.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323239316139656665633138636233613330313736333331326130 Aug 13 03:48:33.727017 env[1201]: time="2025-08-13T03:48:33.726915706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-t2b6d,Uid:dc3d12ad-a6ba-46e6-acbd-9747bea8c699,Namespace:kube-system,Attempt:1,} returns sandbox id \"f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83\"" Aug 13 03:48:33.736807 env[1201]: time="2025-08-13T03:48:33.736753236Z" level=info msg="CreateContainer within sandbox \"f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Aug 13 03:48:33.784398 env[1201]: time="2025-08-13T03:48:33.768681292Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:33.784398 env[1201]: time="2025-08-13T03:48:33.768757083Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:33.784398 env[1201]: time="2025-08-13T03:48:33.768774767Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:33.784398 env[1201]: time="2025-08-13T03:48:33.769778712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f pid=3800 runtime=io.containerd.runc.v2 Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.469 [INFO][3646] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.469 [INFO][3646] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" iface="eth0" netns="/var/run/netns/cni-247f222b-1228-53e4-25b4-e4d7511ee41d" Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.470 [INFO][3646] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" iface="eth0" netns="/var/run/netns/cni-247f222b-1228-53e4-25b4-e4d7511ee41d" Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.470 [INFO][3646] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" iface="eth0" netns="/var/run/netns/cni-247f222b-1228-53e4-25b4-e4d7511ee41d" Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.470 [INFO][3646] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.470 [INFO][3646] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.746 [INFO][3751] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" HandleID="k8s-pod-network.6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.762 [INFO][3751] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.762 [INFO][3751] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.785 [WARNING][3751] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" HandleID="k8s-pod-network.6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.785 [INFO][3751] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" HandleID="k8s-pod-network.6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.796 [INFO][3751] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:33.809560 env[1201]: 2025-08-13 03:48:33.798 [INFO][3646] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:33.810739 env[1201]: time="2025-08-13T03:48:33.810684457Z" level=info msg="TearDown network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\" successfully" Aug 13 03:48:33.810886 env[1201]: time="2025-08-13T03:48:33.810842180Z" level=info msg="StopPodSandbox for \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\" returns successfully" Aug 13 03:48:33.812155 env[1201]: time="2025-08-13T03:48:33.812116701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-655n6,Uid:1fef48a6-e8c5-457a-89b1-9453e961f060,Namespace:calico-system,Attempt:1,}" Aug 13 03:48:33.907373 systemd[1]: run-netns-cni\x2d247f222b\x2d1228\x2d53e4\x2d25b4\x2de4d7511ee41d.mount: Deactivated successfully. Aug 13 03:48:33.907520 systemd[1]: run-netns-cni\x2d20468e27\x2d007a\x2d0b87\x2dafed\x2d646a4046f2e1.mount: Deactivated successfully. Aug 13 03:48:34.004806 env[1201]: time="2025-08-13T03:48:33.979369048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb54c4878-46gtj,Uid:9fe0386d-46a6-42bc-9144-c7de082ae8ad,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186\"" Aug 13 03:48:34.100108 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2130316822.mount: Deactivated successfully. Aug 13 03:48:34.147634 systemd[1]: Started cri-containerd-7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f.scope. Aug 13 03:48:34.157587 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1103900050.mount: Deactivated successfully. Aug 13 03:48:34.177888 systemd-networkd[1026]: cali91363ec9514: Gained IPv6LL Aug 13 03:48:34.241913 systemd-networkd[1026]: cali3319ac05ee4: Gained IPv6LL Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.257269 kernel: kauditd_printk_skb: 320 callbacks suppressed Aug 13 03:48:34.257403 kernel: audit: type=1400 audit(1755056914.253:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.271096 kernel: audit: type=1400 audit(1755056914.253:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.281947 kernel: audit: type=1400 audit(1755056914.253:1127): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.292221 kernel: audit: type=1400 audit(1755056914.253:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.292324 kernel: audit: type=1400 audit(1755056914.253:1129): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.317048 kernel: audit: type=1400 audit(1755056914.253:1130): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.328569 kernel: audit: type=1400 audit(1755056914.253:1131): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.328652 kernel: audit: type=1400 audit(1755056914.253:1132): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.350986 kernel: audit: type=1400 audit(1755056914.253:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.351111 kernel: audit: type=1400 audit(1755056914.253:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.253000 audit: BPF prog-id=158 op=LOAD Aug 13 03:48:34.261000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.261000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3800 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762316666313962623162633237353032643133313238663539343665 Aug 13 03:48:34.261000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.261000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3800 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762316666313962623162633237353032643133313238663539343665 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit: BPF prog-id=159 op=LOAD Aug 13 03:48:34.262000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032e3e0 items=0 ppid=3800 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762316666313962623162633237353032643133313238663539343665 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit: BPF prog-id=160 op=LOAD Aug 13 03:48:34.262000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032e428 items=0 ppid=3800 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762316666313962623162633237353032643133313238663539343665 Aug 13 03:48:34.262000 audit: BPF prog-id=160 op=UNLOAD Aug 13 03:48:34.262000 audit: BPF prog-id=159 op=UNLOAD Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.262000 audit: BPF prog-id=161 op=LOAD Aug 13 03:48:34.262000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032e838 items=0 ppid=3800 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762316666313962623162633237353032643133313238663539343665 Aug 13 03:48:34.395764 env[1201]: time="2025-08-13T03:48:34.395680876Z" level=info msg="CreateContainer within sandbox \"f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7ebf9b96a7a2cb0bfc86f3b806a8de5c8abbc7e71ee8897dc7371d65eb6fa23f\"" Aug 13 03:48:34.421042 env[1201]: time="2025-08-13T03:48:34.420769104Z" level=info msg="StartContainer for \"7ebf9b96a7a2cb0bfc86f3b806a8de5c8abbc7e71ee8897dc7371d65eb6fa23f\"" Aug 13 03:48:34.586088 systemd[1]: Started cri-containerd-7ebf9b96a7a2cb0bfc86f3b806a8de5c8abbc7e71ee8897dc7371d65eb6fa23f.scope. Aug 13 03:48:34.618200 env[1201]: time="2025-08-13T03:48:34.616025629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8565f784fc-jf5gg,Uid:c8daecb8-1c68-4bd0-a72a-4fe8be7133c4,Namespace:calico-system,Attempt:1,} returns sandbox id \"7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f\"" Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.670000 audit: BPF prog-id=162 op=LOAD Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3676 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626639623936613761326362306266633836663362383036613864 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3676 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626639623936613761326362306266633836663362383036613864 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.671000 audit: BPF prog-id=163 op=LOAD Aug 13 03:48:34.671000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027bde0 items=0 ppid=3676 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626639623936613761326362306266633836663362383036613864 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit: BPF prog-id=164 op=LOAD Aug 13 03:48:34.672000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027be28 items=0 ppid=3676 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626639623936613761326362306266633836663362383036613864 Aug 13 03:48:34.672000 audit: BPF prog-id=164 op=UNLOAD Aug 13 03:48:34.672000 audit: BPF prog-id=163 op=UNLOAD Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.672000 audit: BPF prog-id=165 op=LOAD Aug 13 03:48:34.672000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bc238 items=0 ppid=3676 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626639623936613761326362306266633836663362383036613864 Aug 13 03:48:34.691866 systemd-networkd[1026]: cali3bf184aa226: Gained IPv6LL Aug 13 03:48:34.717856 systemd-networkd[1026]: calif99497afd45: Link UP Aug 13 03:48:34.728250 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 03:48:34.728514 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif99497afd45: link becomes ready Aug 13 03:48:34.729808 systemd-networkd[1026]: calif99497afd45: Gained carrier Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.282 [INFO][3792] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0 calico-apiserver-6bb54c4878- calico-apiserver 5f975cc5-b469-4290-aa8b-d31573bf9be5 938 0 2025-08-13 03:47:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bb54c4878 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-amtey.gb1.brightbox.com calico-apiserver-6bb54c4878-2b7lk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif99497afd45 [] [] }} ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-2b7lk" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.283 [INFO][3792] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-2b7lk" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.517 [INFO][3847] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" HandleID="k8s-pod-network.b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.518 [INFO][3847] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" HandleID="k8s-pod-network.b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cdaf0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-amtey.gb1.brightbox.com", "pod":"calico-apiserver-6bb54c4878-2b7lk", "timestamp":"2025-08-13 03:48:34.512559292 +0000 UTC"}, Hostname:"srv-amtey.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.518 [INFO][3847] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.518 [INFO][3847] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.518 [INFO][3847] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-amtey.gb1.brightbox.com' Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.565 [INFO][3847] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.598 [INFO][3847] ipam/ipam.go 394: Looking up existing affinities for host host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.614 [INFO][3847] ipam/ipam.go 511: Trying affinity for 192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.627 [INFO][3847] ipam/ipam.go 158: Attempting to load block cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.653 [INFO][3847] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.653 [INFO][3847] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.70.64/26 handle="k8s-pod-network.b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.664 [INFO][3847] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021 Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.673 [INFO][3847] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.70.64/26 handle="k8s-pod-network.b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.695 [INFO][3847] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.70.70/26] block=192.168.70.64/26 handle="k8s-pod-network.b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.695 [INFO][3847] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.70.70/26] handle="k8s-pod-network.b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.695 [INFO][3847] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:34.780057 env[1201]: 2025-08-13 03:48:34.695 [INFO][3847] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.70.70/26] IPv6=[] ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" HandleID="k8s-pod-network.b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:34.781719 env[1201]: 2025-08-13 03:48:34.708 [INFO][3792] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-2b7lk" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0", GenerateName:"calico-apiserver-6bb54c4878-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f975cc5-b469-4290-aa8b-d31573bf9be5", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb54c4878", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-6bb54c4878-2b7lk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif99497afd45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:34.781719 env[1201]: 2025-08-13 03:48:34.708 [INFO][3792] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.70.70/32] ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-2b7lk" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:34.781719 env[1201]: 2025-08-13 03:48:34.708 [INFO][3792] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif99497afd45 ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-2b7lk" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:34.781719 env[1201]: 2025-08-13 03:48:34.736 [INFO][3792] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-2b7lk" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:34.781719 env[1201]: 2025-08-13 03:48:34.736 [INFO][3792] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-2b7lk" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0", GenerateName:"calico-apiserver-6bb54c4878-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f975cc5-b469-4290-aa8b-d31573bf9be5", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb54c4878", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021", Pod:"calico-apiserver-6bb54c4878-2b7lk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif99497afd45", MAC:"b2:d9:56:65:e1:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:34.781719 env[1201]: 2025-08-13 03:48:34.773 [INFO][3792] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021" Namespace="calico-apiserver" Pod="calico-apiserver-6bb54c4878-2b7lk" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:34.785880 env[1201]: time="2025-08-13T03:48:34.785793549Z" level=info msg="StartContainer for \"7ebf9b96a7a2cb0bfc86f3b806a8de5c8abbc7e71ee8897dc7371d65eb6fa23f\" returns successfully" Aug 13 03:48:34.793000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.793000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.793000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.793000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.793000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.793000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.793000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.793000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.793000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.793000 audit: BPF prog-id=166 op=LOAD Aug 13 03:48:34.793000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee6dace20 a2=98 a3=1fffffffffffffff items=0 ppid=3436 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.793000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 03:48:34.793000 audit: BPF prog-id=166 op=UNLOAD Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit: BPF prog-id=167 op=LOAD Aug 13 03:48:34.797000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee6dacd00 a2=94 a3=3 items=0 ppid=3436 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.797000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 03:48:34.797000 audit: BPF prog-id=167 op=UNLOAD Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit: BPF prog-id=168 op=LOAD Aug 13 03:48:34.797000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee6dacd40 a2=94 a3=7ffee6dacf20 items=0 ppid=3436 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.797000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 03:48:34.797000 audit: BPF prog-id=168 op=UNLOAD Aug 13 03:48:34.797000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.797000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffee6dace10 a2=50 a3=a000000085 items=0 ppid=3436 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.797000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 03:48:34.875000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.875000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.875000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.875000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.875000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.875000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.875000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.875000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.875000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.875000 audit: BPF prog-id=169 op=LOAD Aug 13 03:48:34.875000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea3891450 a2=98 a3=3 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.875000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:34.875000 audit: BPF prog-id=169 op=UNLOAD Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit: BPF prog-id=170 op=LOAD Aug 13 03:48:34.879000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea3891240 a2=94 a3=54428f items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.879000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:34.879000 audit: BPF prog-id=170 op=UNLOAD Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.899004 env[1201]: time="2025-08-13T03:48:34.898630472Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:34.899004 env[1201]: time="2025-08-13T03:48:34.898689930Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:34.899004 env[1201]: time="2025-08-13T03:48:34.898708942Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:34.899004 env[1201]: time="2025-08-13T03:48:34.898904635Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021 pid=3949 runtime=io.containerd.runc.v2 Aug 13 03:48:34.879000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:34.879000 audit: BPF prog-id=171 op=LOAD Aug 13 03:48:34.879000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea3891270 a2=94 a3=2 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:34.879000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:34.912000 audit: BPF prog-id=171 op=UNLOAD Aug 13 03:48:34.925315 env[1201]: time="2025-08-13T03:48:34.925256394Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:34.928624 env[1201]: time="2025-08-13T03:48:34.928578058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:34.947962 env[1201]: time="2025-08-13T03:48:34.946621287Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:34.953529 env[1201]: time="2025-08-13T03:48:34.953473257Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:34.953916 env[1201]: time="2025-08-13T03:48:34.953869268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Aug 13 03:48:34.962908 env[1201]: time="2025-08-13T03:48:34.962841682Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.2\"" Aug 13 03:48:34.964423 env[1201]: time="2025-08-13T03:48:34.964382221Z" level=info msg="CreateContainer within sandbox \"094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Aug 13 03:48:35.016442 systemd[1]: Started cri-containerd-b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021.scope. Aug 13 03:48:35.033481 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1410691565.mount: Deactivated successfully. Aug 13 03:48:35.066039 env[1201]: time="2025-08-13T03:48:35.065971735Z" level=info msg="CreateContainer within sandbox \"094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d8cfbc4b36c112befb6a7c8a5c258a873ae731a8bb09b3eac5f703ae4aecfdb5\"" Aug 13 03:48:35.067370 env[1201]: time="2025-08-13T03:48:35.067324127Z" level=info msg="StartContainer for \"d8cfbc4b36c112befb6a7c8a5c258a873ae731a8bb09b3eac5f703ae4aecfdb5\"" Aug 13 03:48:35.092976 systemd-networkd[1026]: cali152afc2ea8c: Gained IPv6LL Aug 13 03:48:35.164451 systemd[1]: Started cri-containerd-d8cfbc4b36c112befb6a7c8a5c258a873ae731a8bb09b3eac5f703ae4aecfdb5.scope. Aug 13 03:48:35.198096 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali498e84bbf5e: link becomes ready Aug 13 03:48:35.198280 systemd-networkd[1026]: cali498e84bbf5e: Link UP Aug 13 03:48:35.198580 systemd-networkd[1026]: cali498e84bbf5e: Gained carrier Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.218000 audit: BPF prog-id=172 op=LOAD Aug 13 03:48:35.221000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.221000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3949 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236643730613339396462313565316239306330626562353737616439 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3949 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236643730613339396462313565316239306330626562353737616439 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.222000 audit: BPF prog-id=173 op=LOAD Aug 13 03:48:35.222000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001d0960 items=0 ppid=3949 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236643730613339396462313565316239306330626562353737616439 Aug 13 03:48:35.229000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.229000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.229000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.229000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.229000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.229000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.229000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.229000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.229000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.229000 audit: BPF prog-id=174 op=LOAD Aug 13 03:48:35.229000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001d09a8 items=0 ppid=3949 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236643730613339396462313565316239306330626562353737616439 Aug 13 03:48:35.246000 audit: BPF prog-id=174 op=UNLOAD Aug 13 03:48:35.246000 audit: BPF prog-id=173 op=UNLOAD Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.246000 audit: BPF prog-id=175 op=LOAD Aug 13 03:48:35.246000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001d0db8 items=0 ppid=3949 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236643730613339396462313565316239306330626562353737616439 Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:34.682 [INFO][3854] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0 goldmane-58fd7646b9- calico-system 1fef48a6-e8c5-457a-89b1-9453e961f060 944 0 2025-08-13 03:48:00 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:58fd7646b9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-amtey.gb1.brightbox.com goldmane-58fd7646b9-655n6 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali498e84bbf5e [] [] }} ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Namespace="calico-system" Pod="goldmane-58fd7646b9-655n6" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:34.682 [INFO][3854] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Namespace="calico-system" Pod="goldmane-58fd7646b9-655n6" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:34.894 [INFO][3925] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" HandleID="k8s-pod-network.197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:34.895 [INFO][3925] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" HandleID="k8s-pod-network.197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd640), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-amtey.gb1.brightbox.com", "pod":"goldmane-58fd7646b9-655n6", "timestamp":"2025-08-13 03:48:34.889776427 +0000 UTC"}, Hostname:"srv-amtey.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:34.895 [INFO][3925] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:34.895 [INFO][3925] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:34.895 [INFO][3925] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-amtey.gb1.brightbox.com' Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:34.951 [INFO][3925] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:34.972 [INFO][3925] ipam/ipam.go 394: Looking up existing affinities for host host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.044 [INFO][3925] ipam/ipam.go 511: Trying affinity for 192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.103 [INFO][3925] ipam/ipam.go 158: Attempting to load block cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.111 [INFO][3925] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.111 [INFO][3925] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.70.64/26 handle="k8s-pod-network.197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.122 [INFO][3925] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.141 [INFO][3925] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.70.64/26 handle="k8s-pod-network.197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.189 [INFO][3925] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.70.71/26] block=192.168.70.64/26 handle="k8s-pod-network.197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.189 [INFO][3925] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.70.71/26] handle="k8s-pod-network.197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.189 [INFO][3925] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:35.260052 env[1201]: 2025-08-13 03:48:35.189 [INFO][3925] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.70.71/26] IPv6=[] ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" HandleID="k8s-pod-network.197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:35.261388 env[1201]: 2025-08-13 03:48:35.193 [INFO][3854] cni-plugin/k8s.go 418: Populated endpoint ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Namespace="calico-system" Pod="goldmane-58fd7646b9-655n6" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"1fef48a6-e8c5-457a-89b1-9453e961f060", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-58fd7646b9-655n6", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.70.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali498e84bbf5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:35.261388 env[1201]: 2025-08-13 03:48:35.193 [INFO][3854] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.70.71/32] ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Namespace="calico-system" Pod="goldmane-58fd7646b9-655n6" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:35.261388 env[1201]: 2025-08-13 03:48:35.193 [INFO][3854] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali498e84bbf5e ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Namespace="calico-system" Pod="goldmane-58fd7646b9-655n6" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:35.261388 env[1201]: 2025-08-13 03:48:35.203 [INFO][3854] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Namespace="calico-system" Pod="goldmane-58fd7646b9-655n6" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:35.261388 env[1201]: 2025-08-13 03:48:35.203 [INFO][3854] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Namespace="calico-system" Pod="goldmane-58fd7646b9-655n6" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"1fef48a6-e8c5-457a-89b1-9453e961f060", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b", Pod:"goldmane-58fd7646b9-655n6", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.70.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali498e84bbf5e", MAC:"4e:4d:57:26:19:0f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:35.261388 env[1201]: 2025-08-13 03:48:35.252 [INFO][3854] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b" Namespace="calico-system" Pod="goldmane-58fd7646b9-655n6" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:35.296061 env[1201]: time="2025-08-13T03:48:35.291044442Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:35.296061 env[1201]: time="2025-08-13T03:48:35.291109184Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:35.296061 env[1201]: time="2025-08-13T03:48:35.291127618Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:35.296061 env[1201]: time="2025-08-13T03:48:35.291326500Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b pid=4018 runtime=io.containerd.runc.v2 Aug 13 03:48:35.339641 systemd[1]: Started cri-containerd-197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b.scope. Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1dac1c2a78 items=0 ppid=3333 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438636662633462333663313132626566623661376338613563323538 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.347000 audit: BPF prog-id=176 op=LOAD Aug 13 03:48:35.347000 audit[3980]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00033c408 items=0 ppid=3333 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438636662633462333663313132626566623661376338613563323538 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit: BPF prog-id=177 op=LOAD Aug 13 03:48:35.348000 audit[3980]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00033c458 items=0 ppid=3333 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438636662633462333663313132626566623661376338613563323538 Aug 13 03:48:35.348000 audit: BPF prog-id=177 op=UNLOAD Aug 13 03:48:35.348000 audit: BPF prog-id=176 op=UNLOAD Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.348000 audit: BPF prog-id=178 op=LOAD Aug 13 03:48:35.348000 audit[3980]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00033c4e8 items=0 ppid=3333 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438636662633462333663313132626566623661376338613563323538 Aug 13 03:48:35.384719 env[1201]: time="2025-08-13T03:48:35.384653511Z" level=info msg="StartContainer for \"d8cfbc4b36c112befb6a7c8a5c258a873ae731a8bb09b3eac5f703ae4aecfdb5\" returns successfully" Aug 13 03:48:35.455990 env[1201]: time="2025-08-13T03:48:35.450309240Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb54c4878-2b7lk,Uid:5f975cc5-b469-4290-aa8b-d31573bf9be5,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021\"" Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit: BPF prog-id=179 op=LOAD Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139376164376135366166363632396434373135656436626333643266 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139376164376135366166363632396434373135656436626333643266 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.473000 audit: BPF prog-id=180 op=LOAD Aug 13 03:48:35.473000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023ce70 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139376164376135366166363632396434373135656436626333643266 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit: BPF prog-id=181 op=LOAD Aug 13 03:48:35.474000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023ceb8 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139376164376135366166363632396434373135656436626333643266 Aug 13 03:48:35.474000 audit: BPF prog-id=181 op=UNLOAD Aug 13 03:48:35.474000 audit: BPF prog-id=180 op=UNLOAD Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.474000 audit: BPF prog-id=182 op=LOAD Aug 13 03:48:35.474000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023d2c8 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139376164376135366166363632396434373135656436626333643266 Aug 13 03:48:35.528000 audit[4067]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=4067 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:35.528000 audit[4067]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffd11f84e0 a2=0 a3=7fffd11f84cc items=0 ppid=2131 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.528000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:35.533000 audit[3894]: AVC avc: denied { getattr } for pid=3894 comm="coredns" path="cgroup:[4026532870]" dev="nsfs" ino=4026532870 scontext=system_u:system_r:svirt_lxc_net_t:s0:c687,c965 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Aug 13 03:48:35.533000 audit[3894]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000cce08 a3=0 items=0 ppid=3676 pid=3894 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c687,c965 key=(null) Aug 13 03:48:35.533000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Aug 13 03:48:35.545000 audit[4067]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4067 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:35.545000 audit[4067]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffd11f84e0 a2=0 a3=0 items=0 ppid=2131 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:35.611082 env[1201]: time="2025-08-13T03:48:35.610986892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-655n6,Uid:1fef48a6-e8c5-457a-89b1-9453e961f060,Namespace:calico-system,Attempt:1,} returns sandbox id \"197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b\"" Aug 13 03:48:35.630000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.630000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.630000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.630000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.630000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.630000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.630000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.630000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.630000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.630000 audit: BPF prog-id=183 op=LOAD Aug 13 03:48:35.630000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea3891130 a2=94 a3=1 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.630000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.632000 audit: BPF prog-id=183 op=UNLOAD Aug 13 03:48:35.632000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.632000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffea3891200 a2=50 a3=7ffea38912e0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.652000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.652000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea3891140 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.653000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.653000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea3891170 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.653000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.653000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea3891080 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.653000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.653000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea3891190 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.654000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.654000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea3891170 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.654000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.654000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea3891160 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.654000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.654000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea3891190 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.655000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.655000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea3891170 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.655000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.655000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.655000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea3891190 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.655000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.655000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.655000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea3891160 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.655000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.656000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.656000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea38911d0 a2=28 a3=0 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.656000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.656000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.656000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea3890f80 a2=50 a3=1 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.656000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.657000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.657000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.657000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.657000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.657000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.657000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.657000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.657000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.657000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.657000 audit: BPF prog-id=184 op=LOAD Aug 13 03:48:35.657000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea3890f80 a2=94 a3=5 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.657000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.658000 audit: BPF prog-id=184 op=UNLOAD Aug 13 03:48:35.658000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.658000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea3891030 a2=50 a3=1 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.658000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffea3891150 a2=4 a3=38 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.659000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.659000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 03:48:35.659000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea38911a0 a2=94 a3=6 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.659000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 03:48:35.662000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea3890950 a2=94 a3=88 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.662000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 03:48:35.662000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea3890950 a2=94 a3=88 items=0 ppid=3436 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 03:48:35.726000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.726000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.726000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.726000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.726000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.726000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.726000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.726000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.726000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.726000 audit: BPF prog-id=185 op=LOAD Aug 13 03:48:35.726000 audit[4079]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8786dd10 a2=98 a3=1999999999999999 items=0 ppid=3436 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.726000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 03:48:35.737000 audit: BPF prog-id=185 op=UNLOAD Aug 13 03:48:35.737000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.737000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.737000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.737000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.737000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.737000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.737000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.737000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.737000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.737000 audit: BPF prog-id=186 op=LOAD Aug 13 03:48:35.737000 audit[4079]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8786dbf0 a2=94 a3=ffff items=0 ppid=3436 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.737000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 03:48:35.739000 audit: BPF prog-id=186 op=UNLOAD Aug 13 03:48:35.739000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.739000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.739000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.739000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.739000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.739000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.739000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.739000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.739000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.739000 audit: BPF prog-id=187 op=LOAD Aug 13 03:48:35.739000 audit[4079]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8786dc30 a2=94 a3=7ffe8786de10 items=0 ppid=3436 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.739000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 03:48:35.741000 audit: BPF prog-id=187 op=UNLOAD Aug 13 03:48:35.906692 systemd[1]: run-containerd-runc-k8s.io-b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021-runc.MJn7p6.mount: Deactivated successfully. Aug 13 03:48:35.908278 systemd-networkd[1026]: calif99497afd45: Gained IPv6LL Aug 13 03:48:35.910169 systemd-networkd[1026]: vxlan.calico: Link UP Aug 13 03:48:35.910183 systemd-networkd[1026]: vxlan.calico: Gained carrier Aug 13 03:48:35.965000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.965000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.965000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.965000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.965000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.965000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.965000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.965000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.965000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.965000 audit: BPF prog-id=188 op=LOAD Aug 13 03:48:35.965000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5f5a1460 a2=98 a3=20 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.965000 audit: BPF prog-id=188 op=UNLOAD Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit: BPF prog-id=189 op=LOAD Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5f5a1270 a2=94 a3=54428f items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit: BPF prog-id=189 op=UNLOAD Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit: BPF prog-id=190 op=LOAD Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5f5a12a0 a2=94 a3=2 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit: BPF prog-id=190 op=UNLOAD Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5f5a1170 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5f5a11a0 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5f5a10b0 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5f5a11c0 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5f5a11a0 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5f5a1190 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5f5a11c0 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5f5a11a0 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5f5a11c0 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5f5a1190 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5f5a1200 a2=28 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.968000 audit: BPF prog-id=191 op=LOAD Aug 13 03:48:35.968000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5f5a1070 a2=94 a3=0 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.969000 audit: BPF prog-id=191 op=UNLOAD Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd5f5a1060 a2=50 a3=2800 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.975000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd5f5a1060 a2=50 a3=2800 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.975000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit: BPF prog-id=192 op=LOAD Aug 13 03:48:35.975000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5f5a0880 a2=94 a3=2 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.975000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.975000 audit: BPF prog-id=192 op=UNLOAD Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.975000 audit: BPF prog-id=193 op=LOAD Aug 13 03:48:35.975000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5f5a0980 a2=94 a3=30 items=0 ppid=3436 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.975000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 03:48:35.987000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.987000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.987000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.987000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.987000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.987000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.987000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.987000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.987000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.987000 audit: BPF prog-id=194 op=LOAD Aug 13 03:48:35.987000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdb027b30 a2=98 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:35.993000 audit: BPF prog-id=194 op=UNLOAD Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit: BPF prog-id=195 op=LOAD Aug 13 03:48:35.994000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdb027920 a2=94 a3=54428f items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:35.994000 audit: BPF prog-id=195 op=UNLOAD Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:35.994000 audit: BPF prog-id=196 op=LOAD Aug 13 03:48:35.994000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdb027950 a2=94 a3=2 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:35.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:35.994000 audit: BPF prog-id=196 op=UNLOAD Aug 13 03:48:36.209000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.209000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.209000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.209000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.209000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.209000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.209000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.209000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.209000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.209000 audit: BPF prog-id=197 op=LOAD Aug 13 03:48:36.209000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdb027810 a2=94 a3=1 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.210000 audit: BPF prog-id=197 op=UNLOAD Aug 13 03:48:36.210000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.210000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcdb0278e0 a2=50 a3=7ffcdb0279c0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.210000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.222000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.222000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdb027820 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.223000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.223000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdb027850 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.223000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.223000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdb027760 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.223000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.223000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdb027870 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.223000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.223000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdb027850 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.223000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.223000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdb027840 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.223000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.223000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdb027870 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdb027850 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdb027870 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdb027840 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdb0278b0 a2=28 a3=0 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcdb027660 a2=50 a3=1 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit: BPF prog-id=198 op=LOAD Aug 13 03:48:36.224000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcdb027660 a2=94 a3=5 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.224000 audit: BPF prog-id=198 op=UNLOAD Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcdb027710 a2=50 a3=1 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.224000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.224000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcdb027830 a2=4 a3=38 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { confidentiality } for pid=4120 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 03:48:36.225000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcdb027880 a2=94 a3=6 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { confidentiality } for pid=4120 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 03:48:36.225000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcdb027030 a2=94 a3=88 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.225000 audit[4120]: AVC avc: denied { confidentiality } for pid=4120 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 03:48:36.225000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcdb027030 a2=94 a3=88 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.226000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.226000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdb028a60 a2=10 a3=f8f00800 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.226000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.226000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdb028900 a2=10 a3=3 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.226000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.226000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdb0288a0 a2=10 a3=3 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.226000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:36.226000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdb0288a0 a2=10 a3=7 items=0 ppid=3436 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 03:48:36.237000 audit: BPF prog-id=193 op=UNLOAD Aug 13 03:48:36.237000 audit[1026]: SYSCALL arch=c000003e syscall=257 success=yes exit=23 a0=ffffff9c a1=563878a9c250 a2=a0100 a3=0 items=1 ppid=1 pid=1026 auid=4294967295 uid=244 gid=244 euid=244 suid=244 fsuid=244 egid=244 sgid=244 fsgid=244 tty=(none) ses=4294967295 comm="systemd-network" exe="/usr/lib/systemd/systemd-networkd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.237000 audit: CWD cwd="/" Aug 13 03:48:36.237000 audit: PATH item=0 name="/run/systemd/netif/.#stateMrUVjk" inode=3169 dev=00:17 mode=0100644 ouid=244 ogid=244 rdev=00:00 obj=system_u:object_r:systemd_networkd_runtime_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 03:48:36.237000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-networkd" Aug 13 03:48:36.282108 kubelet[1983]: I0813 03:48:36.281916 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-t2b6d" podStartSLOduration=54.280159667 podStartE2EDuration="54.280159667s" podCreationTimestamp="2025-08-13 03:47:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-08-13 03:48:35.311522852 +0000 UTC m=+57.070428642" watchObservedRunningTime="2025-08-13 03:48:36.280159667 +0000 UTC m=+58.039065449" Aug 13 03:48:36.317000 audit[4136]: NETFILTER_CFG table=filter:103 family=2 entries=17 op=nft_register_rule pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:36.317000 audit[4136]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc1364b190 a2=0 a3=7ffc1364b17c items=0 ppid=2131 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:36.325000 audit[4136]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:36.325000 audit[4136]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc1364b190 a2=0 a3=7ffc1364b17c items=0 ppid=2131 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:36.412000 audit[4153]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=4153 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 03:48:36.412000 audit[4153]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffee8686690 a2=0 a3=7ffee868667c items=0 ppid=3436 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.412000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 03:48:36.424000 audit[4152]: NETFILTER_CFG table=raw:106 family=2 entries=21 op=nft_register_chain pid=4152 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 03:48:36.424000 audit[4152]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffca176aa80 a2=0 a3=7ffca176aa6c items=0 ppid=3436 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.424000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 03:48:36.432000 audit[4155]: NETFILTER_CFG table=nat:107 family=2 entries=15 op=nft_register_chain pid=4155 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 03:48:36.432000 audit[4155]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd57c7fa00 a2=0 a3=7ffd57c7f9ec items=0 ppid=3436 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.432000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 03:48:36.439000 audit[4156]: NETFILTER_CFG table=filter:108 family=2 entries=297 op=nft_register_chain pid=4156 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 03:48:36.439000 audit[4156]: SYSCALL arch=c000003e syscall=46 success=yes exit=175552 a0=3 a1=7ffca9aab590 a2=0 a3=7ffca9aab57c items=0 ppid=3436 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:36.439000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 03:48:36.864286 systemd-networkd[1026]: cali498e84bbf5e: Gained IPv6LL Aug 13 03:48:37.427099 env[1201]: time="2025-08-13T03:48:37.427015979Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:37.429983 env[1201]: time="2025-08-13T03:48:37.429945636Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb8f512acf9402730da120a7b0d47d3d9d451b56e6e5eb8bad53ab24f926f954,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:37.433946 env[1201]: time="2025-08-13T03:48:37.433883793Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:37.438398 env[1201]: time="2025-08-13T03:48:37.438348682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:31346d4524252a3b0d2a1d289c4985b8402b498b5ce82a12e682096ab7446678,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:37.439688 env[1201]: time="2025-08-13T03:48:37.439636265Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.2\" returns image reference \"sha256:eb8f512acf9402730da120a7b0d47d3d9d451b56e6e5eb8bad53ab24f926f954\"" Aug 13 03:48:37.443311 env[1201]: time="2025-08-13T03:48:37.443274855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Aug 13 03:48:37.444771 env[1201]: time="2025-08-13T03:48:37.444732656Z" level=info msg="CreateContainer within sandbox \"aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Aug 13 03:48:37.467433 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2960098512.mount: Deactivated successfully. Aug 13 03:48:37.474998 env[1201]: time="2025-08-13T03:48:37.474918544Z" level=info msg="CreateContainer within sandbox \"aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"2f75d76099f094a1702c55c9eba8edcc12b861ee2fcf5f876907f2196c79ff74\"" Aug 13 03:48:37.477800 env[1201]: time="2025-08-13T03:48:37.476770057Z" level=info msg="StartContainer for \"2f75d76099f094a1702c55c9eba8edcc12b861ee2fcf5f876907f2196c79ff74\"" Aug 13 03:48:37.518375 systemd[1]: run-containerd-runc-k8s.io-2f75d76099f094a1702c55c9eba8edcc12b861ee2fcf5f876907f2196c79ff74-runc.W9uB8V.mount: Deactivated successfully. Aug 13 03:48:37.525099 systemd[1]: Started cri-containerd-2f75d76099f094a1702c55c9eba8edcc12b861ee2fcf5f876907f2196c79ff74.scope. Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.563000 audit: BPF prog-id=199 op=LOAD Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3597 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:37.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373564373630393966303934613137303263353563396562613865 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=3597 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:37.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373564373630393966303934613137303263353563396562613865 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.564000 audit: BPF prog-id=200 op=LOAD Aug 13 03:48:37.564000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00034c350 items=0 ppid=3597 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:37.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373564373630393966303934613137303263353563396562613865 Aug 13 03:48:37.568202 systemd-networkd[1026]: vxlan.calico: Gained IPv6LL Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit: BPF prog-id=201 op=LOAD Aug 13 03:48:37.579000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00034c398 items=0 ppid=3597 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:37.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373564373630393966303934613137303263353563396562613865 Aug 13 03:48:37.579000 audit: BPF prog-id=201 op=UNLOAD Aug 13 03:48:37.579000 audit: BPF prog-id=200 op=UNLOAD Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:37.579000 audit: BPF prog-id=202 op=LOAD Aug 13 03:48:37.579000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00034c7a8 items=0 ppid=3597 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:37.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373564373630393966303934613137303263353563396562613865 Aug 13 03:48:37.654853 env[1201]: time="2025-08-13T03:48:37.654761766Z" level=info msg="StartContainer for \"2f75d76099f094a1702c55c9eba8edcc12b861ee2fcf5f876907f2196c79ff74\" returns successfully" Aug 13 03:48:37.679000 audit[4185]: AVC avc: denied { search } for pid=4185 comm="nginx" name="crypto" dev="proc" ino=31720 scontext=system_u:system_r:svirt_lxc_net_t:s0:c287,c693 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 03:48:37.679000 audit[4185]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc22a464728 a2=0 a3=0 items=0 ppid=3597 pid=4185 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c287,c693 key=(null) Aug 13 03:48:37.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Aug 13 03:48:38.622676 env[1201]: time="2025-08-13T03:48:38.622596824Z" level=info msg="StopPodSandbox for \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\"" Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.736 [WARNING][4212] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0", GenerateName:"calico-apiserver-6bb54c4878-", Namespace:"calico-apiserver", SelfLink:"", UID:"9fe0386d-46a6-42bc-9144-c7de082ae8ad", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb54c4878", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186", Pod:"calico-apiserver-6bb54c4878-46gtj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3bf184aa226", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.736 [INFO][4212] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.736 [INFO][4212] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" iface="eth0" netns="" Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.737 [INFO][4212] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.737 [INFO][4212] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.842 [INFO][4221] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" HandleID="k8s-pod-network.7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.844 [INFO][4221] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.844 [INFO][4221] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.863 [WARNING][4221] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" HandleID="k8s-pod-network.7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.863 [INFO][4221] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" HandleID="k8s-pod-network.7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.866 [INFO][4221] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:38.872064 env[1201]: 2025-08-13 03:48:38.869 [INFO][4212] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:38.876626 env[1201]: time="2025-08-13T03:48:38.872110024Z" level=info msg="TearDown network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\" successfully" Aug 13 03:48:38.876626 env[1201]: time="2025-08-13T03:48:38.872159444Z" level=info msg="StopPodSandbox for \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\" returns successfully" Aug 13 03:48:38.876626 env[1201]: time="2025-08-13T03:48:38.873271739Z" level=info msg="RemovePodSandbox for \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\"" Aug 13 03:48:38.876626 env[1201]: time="2025-08-13T03:48:38.873340427Z" level=info msg="Forcibly stopping sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\"" Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:38.970 [WARNING][4237] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0", GenerateName:"calico-apiserver-6bb54c4878-", Namespace:"calico-apiserver", SelfLink:"", UID:"9fe0386d-46a6-42bc-9144-c7de082ae8ad", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb54c4878", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186", Pod:"calico-apiserver-6bb54c4878-46gtj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3bf184aa226", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:38.971 [INFO][4237] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:38.971 [INFO][4237] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" iface="eth0" netns="" Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:38.971 [INFO][4237] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:38.971 [INFO][4237] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:39.011 [INFO][4244] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" HandleID="k8s-pod-network.7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:39.012 [INFO][4244] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:39.012 [INFO][4244] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:39.022 [WARNING][4244] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" HandleID="k8s-pod-network.7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:39.023 [INFO][4244] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" HandleID="k8s-pod-network.7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--46gtj-eth0" Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:39.025 [INFO][4244] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:39.030644 env[1201]: 2025-08-13 03:48:39.028 [INFO][4237] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3" Aug 13 03:48:39.031736 env[1201]: time="2025-08-13T03:48:39.030679977Z" level=info msg="TearDown network for sandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\" successfully" Aug 13 03:48:39.036727 env[1201]: time="2025-08-13T03:48:39.036637088Z" level=info msg="RemovePodSandbox \"7c87f111d0be6587e811ef8291ba80630c4f4dd9000f7f6d38a1f3d1e5314fa3\" returns successfully" Aug 13 03:48:39.037727 env[1201]: time="2025-08-13T03:48:39.037647675Z" level=info msg="StopPodSandbox for \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\"" Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.257 [WARNING][4260] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0", GenerateName:"calico-apiserver-6bb54c4878-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f975cc5-b469-4290-aa8b-d31573bf9be5", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb54c4878", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021", Pod:"calico-apiserver-6bb54c4878-2b7lk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif99497afd45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.258 [INFO][4260] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.258 [INFO][4260] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" iface="eth0" netns="" Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.258 [INFO][4260] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.258 [INFO][4260] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.331 [INFO][4267] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" HandleID="k8s-pod-network.b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.339 [INFO][4267] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.339 [INFO][4267] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.352 [WARNING][4267] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" HandleID="k8s-pod-network.b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.352 [INFO][4267] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" HandleID="k8s-pod-network.b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.354 [INFO][4267] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:39.359110 env[1201]: 2025-08-13 03:48:39.356 [INFO][4260] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:39.361053 env[1201]: time="2025-08-13T03:48:39.359154491Z" level=info msg="TearDown network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\" successfully" Aug 13 03:48:39.361053 env[1201]: time="2025-08-13T03:48:39.359214403Z" level=info msg="StopPodSandbox for \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\" returns successfully" Aug 13 03:48:39.361053 env[1201]: time="2025-08-13T03:48:39.360373274Z" level=info msg="RemovePodSandbox for \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\"" Aug 13 03:48:39.361813 env[1201]: time="2025-08-13T03:48:39.361413481Z" level=info msg="Forcibly stopping sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\"" Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.444 [WARNING][4281] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0", GenerateName:"calico-apiserver-6bb54c4878-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f975cc5-b469-4290-aa8b-d31573bf9be5", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb54c4878", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021", Pod:"calico-apiserver-6bb54c4878-2b7lk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif99497afd45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.445 [INFO][4281] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.445 [INFO][4281] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" iface="eth0" netns="" Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.445 [INFO][4281] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.445 [INFO][4281] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.497 [INFO][4288] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" HandleID="k8s-pod-network.b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.501 [INFO][4288] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.501 [INFO][4288] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.511 [WARNING][4288] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" HandleID="k8s-pod-network.b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.512 [INFO][4288] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" HandleID="k8s-pod-network.b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--apiserver--6bb54c4878--2b7lk-eth0" Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.522 [INFO][4288] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:39.528064 env[1201]: 2025-08-13 03:48:39.524 [INFO][4281] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934" Aug 13 03:48:39.531684 env[1201]: time="2025-08-13T03:48:39.528867291Z" level=info msg="TearDown network for sandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\" successfully" Aug 13 03:48:39.539131 env[1201]: time="2025-08-13T03:48:39.539052335Z" level=info msg="RemovePodSandbox \"b95aa0df2403033c5f978a83183a195ee287688357dd92821650c607a74d2934\" returns successfully" Aug 13 03:48:39.540553 env[1201]: time="2025-08-13T03:48:39.540487574Z" level=info msg="StopPodSandbox for \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\"" Aug 13 03:48:39.752918 env[1201]: time="2025-08-13T03:48:39.749534973Z" level=info msg="StopPodSandbox for \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\"" Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.678 [WARNING][4304] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7", Pod:"csi-node-driver-2b9kg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.70.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3587375792b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.678 [INFO][4304] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.678 [INFO][4304] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" iface="eth0" netns="" Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.678 [INFO][4304] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.678 [INFO][4304] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.770 [INFO][4311] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" HandleID="k8s-pod-network.cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.770 [INFO][4311] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.770 [INFO][4311] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.781 [WARNING][4311] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" HandleID="k8s-pod-network.cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.785 [INFO][4311] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" HandleID="k8s-pod-network.cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.791 [INFO][4311] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:39.795473 env[1201]: 2025-08-13 03:48:39.793 [INFO][4304] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:39.796585 env[1201]: time="2025-08-13T03:48:39.795509714Z" level=info msg="TearDown network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\" successfully" Aug 13 03:48:39.796585 env[1201]: time="2025-08-13T03:48:39.795570051Z" level=info msg="StopPodSandbox for \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\" returns successfully" Aug 13 03:48:39.796585 env[1201]: time="2025-08-13T03:48:39.796241823Z" level=info msg="RemovePodSandbox for \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\"" Aug 13 03:48:39.796585 env[1201]: time="2025-08-13T03:48:39.796284504Z" level=info msg="Forcibly stopping sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\"" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.865 [INFO][4328] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.865 [INFO][4328] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" iface="eth0" netns="/var/run/netns/cni-3ed2afc5-9132-b325-6c93-7d59a35d38e1" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.874 [INFO][4328] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" iface="eth0" netns="/var/run/netns/cni-3ed2afc5-9132-b325-6c93-7d59a35d38e1" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.875 [INFO][4328] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" iface="eth0" netns="/var/run/netns/cni-3ed2afc5-9132-b325-6c93-7d59a35d38e1" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.875 [INFO][4328] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.875 [INFO][4328] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.957 [INFO][4350] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" HandleID="k8s-pod-network.f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.957 [INFO][4350] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.957 [INFO][4350] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.968 [WARNING][4350] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" HandleID="k8s-pod-network.f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.969 [INFO][4350] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" HandleID="k8s-pod-network.f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.972 [INFO][4350] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:39.978474 env[1201]: 2025-08-13 03:48:39.976 [INFO][4328] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:48:39.983803 systemd[1]: run-netns-cni\x2d3ed2afc5\x2d9132\x2db325\x2d6c93\x2d7d59a35d38e1.mount: Deactivated successfully. Aug 13 03:48:39.985792 env[1201]: time="2025-08-13T03:48:39.985733279Z" level=info msg="TearDown network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\" successfully" Aug 13 03:48:39.985978 env[1201]: time="2025-08-13T03:48:39.985918234Z" level=info msg="StopPodSandbox for \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\" returns successfully" Aug 13 03:48:39.988884 env[1201]: time="2025-08-13T03:48:39.988844614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-wnjbx,Uid:664fd2b9-697f-4cfb-8f6b-6e658389fb36,Namespace:kube-system,Attempt:1,}" Aug 13 03:48:40.070724 kernel: kauditd_printk_skb: 862 callbacks suppressed Aug 13 03:48:40.072161 kernel: audit: type=1400 audit(1755056920.057:1329): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:40.057000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:40.084203 kernel: audit: type=1300 audit(1755056920.057:1329): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028de9c0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:48:40.057000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028de9c0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:48:40.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:48:40.098036 kernel: audit: type=1327 audit(1755056920.057:1329): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:48:40.102690 kernel: audit: type=1400 audit(1755056920.071:1330): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:40.071000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:40.071000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028de9e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:48:40.119060 kernel: audit: type=1300 audit(1755056920.071:1330): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028de9e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:48:40.071000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:48:40.127017 kernel: audit: type=1327 audit(1755056920.071:1330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:39.933 [WARNING][4343] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4b9bf56a-e8fc-4014-8648-a8e2d4bacaf3", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7", Pod:"csi-node-driver-2b9kg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.70.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3587375792b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:39.933 [INFO][4343] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:39.933 [INFO][4343] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" iface="eth0" netns="" Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:39.933 [INFO][4343] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:39.933 [INFO][4343] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:40.094 [INFO][4357] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" HandleID="k8s-pod-network.cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:40.095 [INFO][4357] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:40.095 [INFO][4357] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:40.109 [WARNING][4357] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" HandleID="k8s-pod-network.cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:40.109 [INFO][4357] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" HandleID="k8s-pod-network.cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Workload="srv--amtey.gb1.brightbox.com-k8s-csi--node--driver--2b9kg-eth0" Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:40.120 [INFO][4357] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:40.128717 env[1201]: 2025-08-13 03:48:40.126 [INFO][4343] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344" Aug 13 03:48:40.071000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:40.130069 env[1201]: time="2025-08-13T03:48:40.130013930Z" level=info msg="TearDown network for sandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\" successfully" Aug 13 03:48:40.071000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028dea00 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:48:40.144338 kernel: audit: type=1400 audit(1755056920.071:1331): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:40.144516 kernel: audit: type=1300 audit(1755056920.071:1331): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028dea00 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:48:40.071000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:48:40.146979 env[1201]: time="2025-08-13T03:48:40.146905982Z" level=info msg="RemovePodSandbox \"cd79a43e96be85e2fc452c686efb9bc85f42aa7324a62d6679ad83617e672344\" returns successfully" Aug 13 03:48:40.148089 env[1201]: time="2025-08-13T03:48:40.148039526Z" level=info msg="StopPodSandbox for \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\"" Aug 13 03:48:40.153034 kernel: audit: type=1327 audit(1755056920.071:1331): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:48:40.083000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:40.161987 kernel: audit: type=1400 audit(1755056920.083:1332): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:48:40.083000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028760c0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:48:40.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:48:40.438297 systemd-networkd[1026]: calif1ffbff4362: Link UP Aug 13 03:48:40.441637 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 03:48:40.441747 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif1ffbff4362: link becomes ready Aug 13 03:48:40.442593 systemd-networkd[1026]: calif1ffbff4362: Gained carrier Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.213 [INFO][4363] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0 coredns-7c65d6cfc9- kube-system 664fd2b9-697f-4cfb-8f6b-6e658389fb36 991 0 2025-08-13 03:47:42 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-amtey.gb1.brightbox.com coredns-7c65d6cfc9-wnjbx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif1ffbff4362 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Namespace="kube-system" Pod="coredns-7c65d6cfc9-wnjbx" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.214 [INFO][4363] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Namespace="kube-system" Pod="coredns-7c65d6cfc9-wnjbx" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.294 [INFO][4386] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" HandleID="k8s-pod-network.f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.294 [INFO][4386] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" HandleID="k8s-pod-network.f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd600), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-amtey.gb1.brightbox.com", "pod":"coredns-7c65d6cfc9-wnjbx", "timestamp":"2025-08-13 03:48:40.294079568 +0000 UTC"}, Hostname:"srv-amtey.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.294 [INFO][4386] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.294 [INFO][4386] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.295 [INFO][4386] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-amtey.gb1.brightbox.com' Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.310 [INFO][4386] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.338 [INFO][4386] ipam/ipam.go 394: Looking up existing affinities for host host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.374 [INFO][4386] ipam/ipam.go 511: Trying affinity for 192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.382 [INFO][4386] ipam/ipam.go 158: Attempting to load block cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.388 [INFO][4386] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.70.64/26 host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.388 [INFO][4386] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.70.64/26 handle="k8s-pod-network.f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.391 [INFO][4386] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.409 [INFO][4386] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.70.64/26 handle="k8s-pod-network.f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.424 [INFO][4386] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.70.72/26] block=192.168.70.64/26 handle="k8s-pod-network.f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.424 [INFO][4386] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.70.72/26] handle="k8s-pod-network.f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" host="srv-amtey.gb1.brightbox.com" Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.424 [INFO][4386] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:40.475949 env[1201]: 2025-08-13 03:48:40.424 [INFO][4386] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.70.72/26] IPv6=[] ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" HandleID="k8s-pod-network.f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:40.501257 env[1201]: 2025-08-13 03:48:40.428 [INFO][4363] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Namespace="kube-system" Pod="coredns-7c65d6cfc9-wnjbx" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"664fd2b9-697f-4cfb-8f6b-6e658389fb36", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7c65d6cfc9-wnjbx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.70.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1ffbff4362", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:40.501257 env[1201]: 2025-08-13 03:48:40.428 [INFO][4363] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.70.72/32] ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Namespace="kube-system" Pod="coredns-7c65d6cfc9-wnjbx" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:40.501257 env[1201]: 2025-08-13 03:48:40.428 [INFO][4363] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif1ffbff4362 ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Namespace="kube-system" Pod="coredns-7c65d6cfc9-wnjbx" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:40.501257 env[1201]: 2025-08-13 03:48:40.443 [INFO][4363] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Namespace="kube-system" Pod="coredns-7c65d6cfc9-wnjbx" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:40.501257 env[1201]: 2025-08-13 03:48:40.446 [INFO][4363] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Namespace="kube-system" Pod="coredns-7c65d6cfc9-wnjbx" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"664fd2b9-697f-4cfb-8f6b-6e658389fb36", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb", Pod:"coredns-7c65d6cfc9-wnjbx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.70.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1ffbff4362", MAC:"fa:1e:82:ae:2a:0a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:40.501257 env[1201]: 2025-08-13 03:48:40.472 [INFO][4363] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb" Namespace="kube-system" Pod="coredns-7c65d6cfc9-wnjbx" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:48:40.553000 audit[4417]: NETFILTER_CFG table=filter:109 family=2 entries=54 op=nft_register_chain pid=4417 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 03:48:40.553000 audit[4417]: SYSCALL arch=c000003e syscall=46 success=yes exit=25556 a0=3 a1=7ffd7b461460 a2=0 a3=7ffd7b46144c items=0 ppid=3436 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:40.553000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 03:48:40.574434 env[1201]: time="2025-08-13T03:48:40.574180203Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 03:48:40.574672 env[1201]: time="2025-08-13T03:48:40.574508662Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 03:48:40.574672 env[1201]: time="2025-08-13T03:48:40.574608794Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 03:48:40.575359 env[1201]: time="2025-08-13T03:48:40.575262700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb pid=4423 runtime=io.containerd.runc.v2 Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.394 [WARNING][4384] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"1fef48a6-e8c5-457a-89b1-9453e961f060", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b", Pod:"goldmane-58fd7646b9-655n6", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.70.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali498e84bbf5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.394 [INFO][4384] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.394 [INFO][4384] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" iface="eth0" netns="" Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.394 [INFO][4384] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.394 [INFO][4384] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.550 [INFO][4399] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" HandleID="k8s-pod-network.6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.550 [INFO][4399] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.556 [INFO][4399] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.571 [WARNING][4399] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" HandleID="k8s-pod-network.6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.572 [INFO][4399] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" HandleID="k8s-pod-network.6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.586 [INFO][4399] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:40.591175 env[1201]: 2025-08-13 03:48:40.588 [INFO][4384] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:40.592349 env[1201]: time="2025-08-13T03:48:40.591215324Z" level=info msg="TearDown network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\" successfully" Aug 13 03:48:40.592349 env[1201]: time="2025-08-13T03:48:40.591276273Z" level=info msg="StopPodSandbox for \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\" returns successfully" Aug 13 03:48:40.592554 env[1201]: time="2025-08-13T03:48:40.592516361Z" level=info msg="RemovePodSandbox for \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\"" Aug 13 03:48:40.592635 env[1201]: time="2025-08-13T03:48:40.592584793Z" level=info msg="Forcibly stopping sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\"" Aug 13 03:48:40.616169 systemd[1]: Started cri-containerd-f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb.scope. Aug 13 03:48:40.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.667000 audit: BPF prog-id=203 op=LOAD Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4423 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:40.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637303935633530653835656532323461333264356634366566333834 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4423 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:40.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637303935633530653835656532323461333264356634366566333834 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit: BPF prog-id=204 op=LOAD Aug 13 03:48:40.668000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000306520 items=0 ppid=4423 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:40.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637303935633530653835656532323461333264356634366566333834 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.668000 audit: BPF prog-id=205 op=LOAD Aug 13 03:48:40.668000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000306568 items=0 ppid=4423 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:40.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637303935633530653835656532323461333264356634366566333834 Aug 13 03:48:40.669000 audit: BPF prog-id=205 op=UNLOAD Aug 13 03:48:40.669000 audit: BPF prog-id=204 op=UNLOAD Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:40.669000 audit: BPF prog-id=206 op=LOAD Aug 13 03:48:40.669000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000306978 items=0 ppid=4423 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:40.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637303935633530653835656532323461333264356634366566333834 Aug 13 03:48:40.773483 env[1201]: time="2025-08-13T03:48:40.770570768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-wnjbx,Uid:664fd2b9-697f-4cfb-8f6b-6e658389fb36,Namespace:kube-system,Attempt:1,} returns sandbox id \"f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb\"" Aug 13 03:48:40.850144 env[1201]: time="2025-08-13T03:48:40.850086903Z" level=info msg="CreateContainer within sandbox \"f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Aug 13 03:48:40.955952 env[1201]: time="2025-08-13T03:48:40.955854570Z" level=info msg="CreateContainer within sandbox \"f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0a942127ff8c6ae86f3e1f682f92dc61f04dccb6f900fda5cade5b578822de31\"" Aug 13 03:48:40.958039 env[1201]: time="2025-08-13T03:48:40.957995559Z" level=info msg="StartContainer for \"0a942127ff8c6ae86f3e1f682f92dc61f04dccb6f900fda5cade5b578822de31\"" Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:40.862 [WARNING][4449] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"1fef48a6-e8c5-457a-89b1-9453e961f060", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b", Pod:"goldmane-58fd7646b9-655n6", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.70.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali498e84bbf5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:40.863 [INFO][4449] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:40.863 [INFO][4449] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" iface="eth0" netns="" Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:40.863 [INFO][4449] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:40.863 [INFO][4449] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:40.976 [INFO][4471] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" HandleID="k8s-pod-network.6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:40.977 [INFO][4471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:40.977 [INFO][4471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:41.020 [WARNING][4471] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" HandleID="k8s-pod-network.6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:41.020 [INFO][4471] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" HandleID="k8s-pod-network.6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Workload="srv--amtey.gb1.brightbox.com-k8s-goldmane--58fd7646b9--655n6-eth0" Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:41.033 [INFO][4471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:41.046626 env[1201]: 2025-08-13 03:48:41.036 [INFO][4449] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1" Aug 13 03:48:41.046626 env[1201]: time="2025-08-13T03:48:41.045255966Z" level=info msg="TearDown network for sandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\" successfully" Aug 13 03:48:41.071751 systemd[1]: run-containerd-runc-k8s.io-0a942127ff8c6ae86f3e1f682f92dc61f04dccb6f900fda5cade5b578822de31-runc.v65Lk4.mount: Deactivated successfully. Aug 13 03:48:41.078286 systemd[1]: Started cri-containerd-0a942127ff8c6ae86f3e1f682f92dc61f04dccb6f900fda5cade5b578822de31.scope. Aug 13 03:48:41.085689 env[1201]: time="2025-08-13T03:48:41.084990565Z" level=info msg="RemovePodSandbox \"6b8eef0370ea1e12df047f87ae13e2ee38e43d204ad38743c4b25bdbbac21ce1\" returns successfully" Aug 13 03:48:41.087136 env[1201]: time="2025-08-13T03:48:41.087097988Z" level=info msg="StopPodSandbox for \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\"" Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.109000 audit: BPF prog-id=207 op=LOAD Aug 13 03:48:41.111000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.111000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4423 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:41.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393432313237666638633661653836663365316636383266393264 Aug 13 03:48:41.111000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.111000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4423 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:41.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393432313237666638633661653836663365316636383266393264 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.112000 audit: BPF prog-id=208 op=LOAD Aug 13 03:48:41.112000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000ad520 items=0 ppid=4423 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:41.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393432313237666638633661653836663365316636383266393264 Aug 13 03:48:41.114000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.114000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.114000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.114000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.114000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.114000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.114000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.114000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.114000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.114000 audit: BPF prog-id=209 op=LOAD Aug 13 03:48:41.114000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000ad568 items=0 ppid=4423 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:41.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393432313237666638633661653836663365316636383266393264 Aug 13 03:48:41.115000 audit: BPF prog-id=209 op=UNLOAD Aug 13 03:48:41.115000 audit: BPF prog-id=208 op=UNLOAD Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:41.116000 audit: BPF prog-id=210 op=LOAD Aug 13 03:48:41.116000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000ad978 items=0 ppid=4423 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:41.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061393432313237666638633661653836663365316636383266393264 Aug 13 03:48:41.159548 env[1201]: time="2025-08-13T03:48:41.159421213Z" level=info msg="StartContainer for \"0a942127ff8c6ae86f3e1f682f92dc61f04dccb6f900fda5cade5b578822de31\" returns successfully" Aug 13 03:48:41.251000 audit[4496]: AVC avc: denied { getattr } for pid=4496 comm="coredns" path="cgroup:[4026532906]" dev="nsfs" ino=4026532906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c959,c972 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Aug 13 03:48:41.251000 audit[4496]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000130108 a2=c0001f2448 a3=0 items=0 ppid=4423 pid=4496 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c959,c972 key=(null) Aug 13 03:48:41.251000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.234 [WARNING][4511] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.234 [INFO][4511] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.235 [INFO][4511] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" iface="eth0" netns="" Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.235 [INFO][4511] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.235 [INFO][4511] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.341 [INFO][4528] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" HandleID="k8s-pod-network.af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.342 [INFO][4528] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.342 [INFO][4528] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.371 [WARNING][4528] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" HandleID="k8s-pod-network.af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.371 [INFO][4528] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" HandleID="k8s-pod-network.af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.375 [INFO][4528] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:41.381479 env[1201]: 2025-08-13 03:48:41.378 [INFO][4511] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:41.381479 env[1201]: time="2025-08-13T03:48:41.380608913Z" level=info msg="TearDown network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\" successfully" Aug 13 03:48:41.381479 env[1201]: time="2025-08-13T03:48:41.380654578Z" level=info msg="StopPodSandbox for \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\" returns successfully" Aug 13 03:48:41.381479 env[1201]: time="2025-08-13T03:48:41.381217235Z" level=info msg="RemovePodSandbox for \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\"" Aug 13 03:48:41.381479 env[1201]: time="2025-08-13T03:48:41.381255489Z" level=info msg="Forcibly stopping sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\"" Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.547 [WARNING][4547] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" WorkloadEndpoint="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.548 [INFO][4547] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.548 [INFO][4547] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" iface="eth0" netns="" Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.548 [INFO][4547] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.548 [INFO][4547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.635 [INFO][4560] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" HandleID="k8s-pod-network.af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.635 [INFO][4560] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.635 [INFO][4560] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.649 [WARNING][4560] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" HandleID="k8s-pod-network.af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.649 [INFO][4560] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" HandleID="k8s-pod-network.af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Workload="srv--amtey.gb1.brightbox.com-k8s-whisker--5b8646fc5--27z9b-eth0" Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.652 [INFO][4560] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:41.659145 env[1201]: 2025-08-13 03:48:41.655 [INFO][4547] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea" Aug 13 03:48:41.661155 env[1201]: time="2025-08-13T03:48:41.659103026Z" level=info msg="TearDown network for sandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\" successfully" Aug 13 03:48:41.664877 env[1201]: time="2025-08-13T03:48:41.663578712Z" level=info msg="RemovePodSandbox \"af4510ebc16c24a69d605036db2d565770dce88f8f9a8961144881e8c496ecea\" returns successfully" Aug 13 03:48:41.664877 env[1201]: time="2025-08-13T03:48:41.664355382Z" level=info msg="StopPodSandbox for \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\"" Aug 13 03:48:41.666000 audit[4567]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=4567 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:41.666000 audit[4567]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe153319b0 a2=0 a3=7ffe1533199c items=0 ppid=2131 pid=4567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:41.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:41.679000 audit[4567]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=4567 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:41.679000 audit[4567]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe153319b0 a2=0 a3=7ffe1533199c items=0 ppid=2131 pid=4567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:41.679000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.757 [WARNING][4578] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0", GenerateName:"calico-kube-controllers-8565f784fc-", Namespace:"calico-system", SelfLink:"", UID:"c8daecb8-1c68-4bd0-a72a-4fe8be7133c4", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8565f784fc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f", Pod:"calico-kube-controllers-8565f784fc-jf5gg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.70.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali152afc2ea8c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.758 [INFO][4578] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.758 [INFO][4578] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" iface="eth0" netns="" Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.758 [INFO][4578] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.758 [INFO][4578] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.811 [INFO][4585] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" HandleID="k8s-pod-network.d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.813 [INFO][4585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.813 [INFO][4585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.823 [WARNING][4585] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" HandleID="k8s-pod-network.d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.823 [INFO][4585] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" HandleID="k8s-pod-network.d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.826 [INFO][4585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:41.830598 env[1201]: 2025-08-13 03:48:41.828 [INFO][4578] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:41.832004 env[1201]: time="2025-08-13T03:48:41.831950705Z" level=info msg="TearDown network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\" successfully" Aug 13 03:48:41.832169 env[1201]: time="2025-08-13T03:48:41.832124879Z" level=info msg="StopPodSandbox for \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\" returns successfully" Aug 13 03:48:41.832853 env[1201]: time="2025-08-13T03:48:41.832816704Z" level=info msg="RemovePodSandbox for \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\"" Aug 13 03:48:41.833055 env[1201]: time="2025-08-13T03:48:41.833000232Z" level=info msg="Forcibly stopping sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\"" Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.896 [WARNING][4601] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0", GenerateName:"calico-kube-controllers-8565f784fc-", Namespace:"calico-system", SelfLink:"", UID:"c8daecb8-1c68-4bd0-a72a-4fe8be7133c4", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 48, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8565f784fc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f", Pod:"calico-kube-controllers-8565f784fc-jf5gg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.70.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali152afc2ea8c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.896 [INFO][4601] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.896 [INFO][4601] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" iface="eth0" netns="" Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.896 [INFO][4601] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.896 [INFO][4601] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.939 [INFO][4608] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" HandleID="k8s-pod-network.d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.939 [INFO][4608] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.939 [INFO][4608] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.950 [WARNING][4608] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" HandleID="k8s-pod-network.d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.950 [INFO][4608] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" HandleID="k8s-pod-network.d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Workload="srv--amtey.gb1.brightbox.com-k8s-calico--kube--controllers--8565f784fc--jf5gg-eth0" Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.953 [INFO][4608] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:41.956900 env[1201]: 2025-08-13 03:48:41.955 [INFO][4601] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb" Aug 13 03:48:41.958652 env[1201]: time="2025-08-13T03:48:41.957556166Z" level=info msg="TearDown network for sandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\" successfully" Aug 13 03:48:41.962425 env[1201]: time="2025-08-13T03:48:41.962375992Z" level=info msg="RemovePodSandbox \"d98bc6d8d0f665967ce95f396edff02408506f59e066d6edb41f511a77ceb8bb\" returns successfully" Aug 13 03:48:41.963267 env[1201]: time="2025-08-13T03:48:41.963230802Z" level=info msg="StopPodSandbox for \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\"" Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.063 [WARNING][4625] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"dc3d12ad-a6ba-46e6-acbd-9747bea8c699", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83", Pod:"coredns-7c65d6cfc9-t2b6d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.70.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali91363ec9514", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.063 [INFO][4625] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.063 [INFO][4625] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" iface="eth0" netns="" Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.063 [INFO][4625] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.063 [INFO][4625] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.108 [INFO][4632] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" HandleID="k8s-pod-network.a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.108 [INFO][4632] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.108 [INFO][4632] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.127 [WARNING][4632] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" HandleID="k8s-pod-network.a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.127 [INFO][4632] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" HandleID="k8s-pod-network.a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.130 [INFO][4632] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:42.135045 env[1201]: 2025-08-13 03:48:42.132 [INFO][4625] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:42.136180 env[1201]: time="2025-08-13T03:48:42.135089080Z" level=info msg="TearDown network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\" successfully" Aug 13 03:48:42.136180 env[1201]: time="2025-08-13T03:48:42.135140055Z" level=info msg="StopPodSandbox for \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\" returns successfully" Aug 13 03:48:42.136180 env[1201]: time="2025-08-13T03:48:42.136163012Z" level=info msg="RemovePodSandbox for \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\"" Aug 13 03:48:42.136650 env[1201]: time="2025-08-13T03:48:42.136205070Z" level=info msg="Forcibly stopping sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\"" Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.216 [WARNING][4648] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"dc3d12ad-a6ba-46e6-acbd-9747bea8c699", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"f8189cf9876082385adb4a95ea5af669b4ac9ba57321c7933ded209309661c83", Pod:"coredns-7c65d6cfc9-t2b6d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.70.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali91363ec9514", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.217 [INFO][4648] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.217 [INFO][4648] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" iface="eth0" netns="" Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.217 [INFO][4648] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.217 [INFO][4648] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.264 [INFO][4655] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" HandleID="k8s-pod-network.a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.268 [INFO][4655] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.268 [INFO][4655] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.288 [WARNING][4655] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" HandleID="k8s-pod-network.a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.288 [INFO][4655] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" HandleID="k8s-pod-network.a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--t2b6d-eth0" Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.292 [INFO][4655] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:48:42.298381 env[1201]: 2025-08-13 03:48:42.295 [INFO][4648] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5" Aug 13 03:48:42.300224 env[1201]: time="2025-08-13T03:48:42.300169417Z" level=info msg="TearDown network for sandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\" successfully" Aug 13 03:48:42.314837 env[1201]: time="2025-08-13T03:48:42.314569837Z" level=info msg="RemovePodSandbox \"a7997985c3db6e13c896aea0b22ddb91f90d5683e1e820eeb0948d904dda57a5\" returns successfully" Aug 13 03:48:42.373170 systemd-networkd[1026]: calif1ffbff4362: Gained IPv6LL Aug 13 03:48:42.524771 kubelet[1983]: I0813 03:48:42.521288 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-wnjbx" podStartSLOduration=60.502263104 podStartE2EDuration="1m0.502263104s" podCreationTimestamp="2025-08-13 03:47:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-08-13 03:48:41.550649117 +0000 UTC m=+63.309554905" watchObservedRunningTime="2025-08-13 03:48:42.502263104 +0000 UTC m=+64.261168887" Aug 13 03:48:42.550000 audit[4662]: NETFILTER_CFG table=filter:112 family=2 entries=14 op=nft_register_rule pid=4662 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:42.550000 audit[4662]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcd968bbc0 a2=0 a3=7ffcd968bbac items=0 ppid=2131 pid=4662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:42.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:42.595000 audit[4662]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4662 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:42.595000 audit[4662]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcd968bbc0 a2=0 a3=7ffcd968bbac items=0 ppid=2131 pid=4662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:42.595000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:42.988034 env[1201]: time="2025-08-13T03:48:42.987920827Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:42.990988 env[1201]: time="2025-08-13T03:48:42.990945883Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:42.993032 env[1201]: time="2025-08-13T03:48:42.992990830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:42.995052 env[1201]: time="2025-08-13T03:48:42.995013739Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:42.996320 env[1201]: time="2025-08-13T03:48:42.996275537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd\"" Aug 13 03:48:43.016669 env[1201]: time="2025-08-13T03:48:43.016596839Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.2\"" Aug 13 03:48:43.023353 env[1201]: time="2025-08-13T03:48:43.023284687Z" level=info msg="CreateContainer within sandbox \"e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Aug 13 03:48:43.043666 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2332279877.mount: Deactivated successfully. Aug 13 03:48:43.060693 env[1201]: time="2025-08-13T03:48:43.060615017Z" level=info msg="CreateContainer within sandbox \"e62291a9efec18cb3a301763312a007b60417a175297d97afea11e646528b186\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1f570f16f18d8292e8dcd3897a31b6cb6717b80c24fbea8553b028d84bdf43c7\"" Aug 13 03:48:43.064553 env[1201]: time="2025-08-13T03:48:43.064387490Z" level=info msg="StartContainer for \"1f570f16f18d8292e8dcd3897a31b6cb6717b80c24fbea8553b028d84bdf43c7\"" Aug 13 03:48:43.102453 systemd[1]: Started cri-containerd-1f570f16f18d8292e8dcd3897a31b6cb6717b80c24fbea8553b028d84bdf43c7.scope. Aug 13 03:48:43.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.137000 audit: BPF prog-id=211 op=LOAD Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3735 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:43.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353730663136663138643832393265386463643338393761333162 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3735 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:43.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353730663136663138643832393265386463643338393761333162 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.139000 audit: BPF prog-id=212 op=LOAD Aug 13 03:48:43.139000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c33d0 items=0 ppid=3735 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:43.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353730663136663138643832393265386463643338393761333162 Aug 13 03:48:43.142000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.142000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.142000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.142000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.142000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.142000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.142000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.142000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.142000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.142000 audit: BPF prog-id=213 op=LOAD Aug 13 03:48:43.142000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c3418 items=0 ppid=3735 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:43.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353730663136663138643832393265386463643338393761333162 Aug 13 03:48:43.143000 audit: BPF prog-id=213 op=UNLOAD Aug 13 03:48:43.143000 audit: BPF prog-id=212 op=UNLOAD Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:43.145000 audit: BPF prog-id=214 op=LOAD Aug 13 03:48:43.145000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c3828 items=0 ppid=3735 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:43.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353730663136663138643832393265386463643338393761333162 Aug 13 03:48:43.197354 env[1201]: time="2025-08-13T03:48:43.197172492Z" level=info msg="StartContainer for \"1f570f16f18d8292e8dcd3897a31b6cb6717b80c24fbea8553b028d84bdf43c7\" returns successfully" Aug 13 03:48:43.520000 audit[4704]: NETFILTER_CFG table=filter:114 family=2 entries=14 op=nft_register_rule pid=4704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:43.520000 audit[4704]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe791a9e40 a2=0 a3=7ffe791a9e2c items=0 ppid=2131 pid=4704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:43.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:43.527000 audit[4704]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:43.527000 audit[4704]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe791a9e40 a2=0 a3=7ffe791a9e2c items=0 ppid=2131 pid=4704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:43.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:45.492566 kubelet[1983]: I0813 03:48:45.492517 1983 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Aug 13 03:48:45.575000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:48:45.587508 kernel: kauditd_printk_skb: 197 callbacks suppressed Aug 13 03:48:45.587859 kernel: audit: type=1400 audit(1755056925.575:1395): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:48:45.575000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f19d40 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:48:45.606216 kernel: audit: type=1300 audit(1755056925.575:1395): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f19d40 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:48:45.606325 kernel: audit: type=1327 audit(1755056925.575:1395): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:48:45.575000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:48:45.811352 kubelet[1983]: I0813 03:48:45.810682 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bb54c4878-46gtj" podStartSLOduration=40.871950789 podStartE2EDuration="49.81065721s" podCreationTimestamp="2025-08-13 03:47:56 +0000 UTC" firstStartedPulling="2025-08-13 03:48:34.075098903 +0000 UTC m=+55.834004682" lastFinishedPulling="2025-08-13 03:48:43.013805312 +0000 UTC m=+64.772711103" observedRunningTime="2025-08-13 03:48:43.484977486 +0000 UTC m=+65.243883291" watchObservedRunningTime="2025-08-13 03:48:45.81065721 +0000 UTC m=+67.569562984" Aug 13 03:48:45.892000 audit[4711]: NETFILTER_CFG table=filter:116 family=2 entries=13 op=nft_register_rule pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:45.899982 kernel: audit: type=1325 audit(1755056925.892:1396): table=filter:116 family=2 entries=13 op=nft_register_rule pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:45.892000 audit[4711]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff9dd9dd20 a2=0 a3=7fff9dd9dd0c items=0 ppid=2131 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:45.909013 kernel: audit: type=1300 audit(1755056925.892:1396): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff9dd9dd20 a2=0 a3=7fff9dd9dd0c items=0 ppid=2131 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:45.909588 kernel: audit: type=1327 audit(1755056925.892:1396): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:45.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:45.916000 audit[4711]: NETFILTER_CFG table=nat:117 family=2 entries=27 op=nft_register_chain pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:45.922915 kernel: audit: type=1325 audit(1755056925.916:1397): table=nat:117 family=2 entries=27 op=nft_register_chain pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:45.923047 kernel: audit: type=1300 audit(1755056925.916:1397): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff9dd9dd20 a2=0 a3=7fff9dd9dd0c items=0 ppid=2131 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:45.916000 audit[4711]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff9dd9dd20 a2=0 a3=7fff9dd9dd0c items=0 ppid=2131 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:45.916000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:45.934635 kernel: audit: type=1327 audit(1755056925.916:1397): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:49.025950 env[1201]: time="2025-08-13T03:48:49.025835296Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:49.030331 env[1201]: time="2025-08-13T03:48:49.030282711Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:761b294e26556b58aabc85094a3d465389e6b141b7400aee732bd13400a6124a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:49.033110 env[1201]: time="2025-08-13T03:48:49.033063424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:49.036773 env[1201]: time="2025-08-13T03:48:49.036722216Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:5d3ecdec3cbbe8f7009077102e35e8a2141161b59c548cf3f97829177677cbce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:49.037546 env[1201]: time="2025-08-13T03:48:49.037489258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.2\" returns image reference \"sha256:761b294e26556b58aabc85094a3d465389e6b141b7400aee732bd13400a6124a\"" Aug 13 03:48:49.083230 env[1201]: time="2025-08-13T03:48:49.082757110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Aug 13 03:48:49.305009 env[1201]: time="2025-08-13T03:48:49.304101924Z" level=info msg="CreateContainer within sandbox \"7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Aug 13 03:48:49.327789 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2739775499.mount: Deactivated successfully. Aug 13 03:48:49.335387 env[1201]: time="2025-08-13T03:48:49.335333274Z" level=info msg="CreateContainer within sandbox \"7b1ff19bb1bc27502d13128f5946ebaadb7501423deacd800fb82e9d62dafc9f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099\"" Aug 13 03:48:49.339190 env[1201]: time="2025-08-13T03:48:49.339057627Z" level=info msg="StartContainer for \"7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099\"" Aug 13 03:48:49.420540 systemd[1]: Started cri-containerd-7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099.scope. Aug 13 03:48:49.465007 kernel: audit: type=1400 audit(1755056929.453:1398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.453000 audit: BPF prog-id=215 op=LOAD Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3800 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:49.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393566363164613735373833306438623433313739663964323438 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3800 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:49.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393566363164613735373833306438623433313739663964323438 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.464000 audit: BPF prog-id=216 op=LOAD Aug 13 03:48:49.464000 audit[4728]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a3190 items=0 ppid=3800 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:49.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393566363164613735373833306438623433313739663964323438 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit: BPF prog-id=217 op=LOAD Aug 13 03:48:49.465000 audit[4728]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a31d8 items=0 ppid=3800 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:49.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393566363164613735373833306438623433313739663964323438 Aug 13 03:48:49.465000 audit: BPF prog-id=217 op=UNLOAD Aug 13 03:48:49.465000 audit: BPF prog-id=216 op=UNLOAD Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:49.465000 audit: BPF prog-id=218 op=LOAD Aug 13 03:48:49.465000 audit[4728]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a35e8 items=0 ppid=3800 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:49.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393566363164613735373833306438623433313739663964323438 Aug 13 03:48:49.539848 env[1201]: time="2025-08-13T03:48:49.539746740Z" level=info msg="StartContainer for \"7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099\" returns successfully" Aug 13 03:48:50.618691 systemd[1]: run-containerd-runc-k8s.io-7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099-runc.DObOYN.mount: Deactivated successfully. Aug 13 03:48:50.639095 kubelet[1983]: I0813 03:48:50.638983 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-8565f784fc-jf5gg" podStartSLOduration=35.213665358 podStartE2EDuration="49.63886721s" podCreationTimestamp="2025-08-13 03:48:01 +0000 UTC" firstStartedPulling="2025-08-13 03:48:34.625190442 +0000 UTC m=+56.384096221" lastFinishedPulling="2025-08-13 03:48:49.050392278 +0000 UTC m=+70.809298073" observedRunningTime="2025-08-13 03:48:50.621738035 +0000 UTC m=+72.380643823" watchObservedRunningTime="2025-08-13 03:48:50.63886721 +0000 UTC m=+72.397773000" Aug 13 03:48:51.265717 systemd[1]: run-containerd-runc-k8s.io-f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82-runc.lgo9RY.mount: Deactivated successfully. Aug 13 03:48:51.927541 env[1201]: time="2025-08-13T03:48:51.927468676Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:51.931830 env[1201]: time="2025-08-13T03:48:51.931787885Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:51.935004 env[1201]: time="2025-08-13T03:48:51.934967917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:51.938219 env[1201]: time="2025-08-13T03:48:51.938178613Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:51.939411 env[1201]: time="2025-08-13T03:48:51.939360870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Aug 13 03:48:51.942428 env[1201]: time="2025-08-13T03:48:51.942121433Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Aug 13 03:48:51.945585 env[1201]: time="2025-08-13T03:48:51.945546133Z" level=info msg="CreateContainer within sandbox \"094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Aug 13 03:48:51.977257 env[1201]: time="2025-08-13T03:48:51.977192636Z" level=info msg="CreateContainer within sandbox \"094d8cf8ec46f1ac347503ed6ef7aaf3f468330181661cada365779a4ea205c7\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"73b9700d849c95326c960361557fc86d484b2747e9515e49b6e8c7626f940768\"" Aug 13 03:48:51.978386 env[1201]: time="2025-08-13T03:48:51.978273342Z" level=info msg="StartContainer for \"73b9700d849c95326c960361557fc86d484b2747e9515e49b6e8c7626f940768\"" Aug 13 03:48:52.053380 systemd[1]: Started cri-containerd-73b9700d849c95326c960361557fc86d484b2747e9515e49b6e8c7626f940768.scope. Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.114962 kernel: kauditd_printk_skb: 56 callbacks suppressed Aug 13 03:48:52.115442 kernel: audit: type=1400 audit(1755056932.105:1416): avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1b6f64d768 items=0 ppid=3333 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.130022 kernel: audit: type=1300 audit(1755056932.105:1416): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1b6f64d768 items=0 ppid=3333 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.150959 kernel: audit: type=1327 audit(1755056932.105:1416): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623937303064383439633935333236633936303336313535376663 Aug 13 03:48:52.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623937303064383439633935333236633936303336313535376663 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.158957 kernel: audit: type=1400 audit(1755056932.105:1417): avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.165950 kernel: audit: type=1400 audit(1755056932.105:1417): avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.168357 env[1201]: time="2025-08-13T03:48:52.168292364Z" level=info msg="StartContainer for \"73b9700d849c95326c960361557fc86d484b2747e9515e49b6e8c7626f940768\" returns successfully" Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.177959 kernel: audit: type=1400 audit(1755056932.105:1417): avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.188958 kernel: audit: type=1400 audit(1755056932.105:1417): avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.189115 kernel: audit: type=1400 audit(1755056932.105:1417): avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.200200 kernel: audit: type=1400 audit(1755056932.105:1417): avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.208665 kernel: audit: type=1400 audit(1755056932.105:1417): avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit: BPF prog-id=219 op=LOAD Aug 13 03:48:52.105000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001fac98 items=0 ppid=3333 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623937303064383439633935333236633936303336313535376663 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit: BPF prog-id=220 op=LOAD Aug 13 03:48:52.105000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001face8 items=0 ppid=3333 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623937303064383439633935333236633936303336313535376663 Aug 13 03:48:52.105000 audit: BPF prog-id=220 op=UNLOAD Aug 13 03:48:52.105000 audit: BPF prog-id=219 op=UNLOAD Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.105000 audit: BPF prog-id=221 op=LOAD Aug 13 03:48:52.105000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001fad78 items=0 ppid=3333 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623937303064383439633935333236633936303336313535376663 Aug 13 03:48:52.266014 systemd[1]: run-containerd-runc-k8s.io-73b9700d849c95326c960361557fc86d484b2747e9515e49b6e8c7626f940768-runc.pqZGI7.mount: Deactivated successfully. Aug 13 03:48:52.340418 env[1201]: time="2025-08-13T03:48:52.340356904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:52.342259 env[1201]: time="2025-08-13T03:48:52.342223971Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:52.345343 env[1201]: time="2025-08-13T03:48:52.345297640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:52.349154 env[1201]: time="2025-08-13T03:48:52.349110153Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd\"" Aug 13 03:48:52.349871 env[1201]: time="2025-08-13T03:48:52.349833840Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:48:52.354280 env[1201]: time="2025-08-13T03:48:52.354218189Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.2\"" Aug 13 03:48:52.356686 env[1201]: time="2025-08-13T03:48:52.356630644Z" level=info msg="CreateContainer within sandbox \"b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Aug 13 03:48:52.385161 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount249966999.mount: Deactivated successfully. Aug 13 03:48:52.387583 env[1201]: time="2025-08-13T03:48:52.387513765Z" level=info msg="CreateContainer within sandbox \"b6d70a399db15e1b90c0beb577ad9bcd531ffe15bbdf3d3ba6242597a31b0021\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"71eaf9a739204ed0b57530798f370f32c1d894693c053512e0fe38f0d2ceec19\"" Aug 13 03:48:52.389471 env[1201]: time="2025-08-13T03:48:52.389434525Z" level=info msg="StartContainer for \"71eaf9a739204ed0b57530798f370f32c1d894693c053512e0fe38f0d2ceec19\"" Aug 13 03:48:52.423698 systemd[1]: Started cri-containerd-71eaf9a739204ed0b57530798f370f32c1d894693c053512e0fe38f0d2ceec19.scope. Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.462000 audit: BPF prog-id=222 op=LOAD Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3949 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731656166396137333932303465643062353735333037393866333730 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3949 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731656166396137333932303465643062353735333037393866333730 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit: BPF prog-id=223 op=LOAD Aug 13 03:48:52.464000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000216810 items=0 ppid=3949 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731656166396137333932303465643062353735333037393866333730 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit: BPF prog-id=224 op=LOAD Aug 13 03:48:52.464000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000216858 items=0 ppid=3949 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731656166396137333932303465643062353735333037393866333730 Aug 13 03:48:52.464000 audit: BPF prog-id=224 op=UNLOAD Aug 13 03:48:52.464000 audit: BPF prog-id=223 op=UNLOAD Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:48:52.464000 audit: BPF prog-id=225 op=LOAD Aug 13 03:48:52.464000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000216c68 items=0 ppid=3949 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731656166396137333932303465643062353735333037393866333730 Aug 13 03:48:52.527950 env[1201]: time="2025-08-13T03:48:52.527860863Z" level=info msg="StartContainer for \"71eaf9a739204ed0b57530798f370f32c1d894693c053512e0fe38f0d2ceec19\" returns successfully" Aug 13 03:48:52.722970 kubelet[1983]: I0813 03:48:52.722717 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-2b9kg" podStartSLOduration=32.185833378 podStartE2EDuration="52.722672852s" podCreationTimestamp="2025-08-13 03:48:00 +0000 UTC" firstStartedPulling="2025-08-13 03:48:31.4046661 +0000 UTC m=+53.163571879" lastFinishedPulling="2025-08-13 03:48:51.941505567 +0000 UTC m=+73.700411353" observedRunningTime="2025-08-13 03:48:52.719762498 +0000 UTC m=+74.478668295" watchObservedRunningTime="2025-08-13 03:48:52.722672852 +0000 UTC m=+74.481578638" Aug 13 03:48:52.742771 kubelet[1983]: I0813 03:48:52.742690 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bb54c4878-2b7lk" podStartSLOduration=39.849831855 podStartE2EDuration="56.742667348s" podCreationTimestamp="2025-08-13 03:47:56 +0000 UTC" firstStartedPulling="2025-08-13 03:48:35.460609593 +0000 UTC m=+57.219515372" lastFinishedPulling="2025-08-13 03:48:52.353445054 +0000 UTC m=+74.112350865" observedRunningTime="2025-08-13 03:48:52.740898736 +0000 UTC m=+74.499804524" watchObservedRunningTime="2025-08-13 03:48:52.742667348 +0000 UTC m=+74.501573133" Aug 13 03:48:52.860000 audit[4883]: NETFILTER_CFG table=filter:118 family=2 entries=12 op=nft_register_rule pid=4883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:52.860000 audit[4883]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffda0b93390 a2=0 a3=7ffda0b9337c items=0 ppid=2131 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:52.875000 audit[4883]: NETFILTER_CFG table=nat:119 family=2 entries=30 op=nft_register_rule pid=4883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:48:52.875000 audit[4883]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffda0b93390 a2=0 a3=7ffda0b9337c items=0 ppid=2131 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:48:52.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:48:53.039892 kubelet[1983]: I0813 03:48:53.037213 1983 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Aug 13 03:48:53.040289 kubelet[1983]: I0813 03:48:53.040263 1983 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Aug 13 03:48:53.669599 kubelet[1983]: I0813 03:48:53.668656 1983 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Aug 13 03:48:55.216000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:48:55.216000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f69e80 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:48:55.216000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:49:00.248904 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2726066281.mount: Deactivated successfully. Aug 13 03:49:01.943707 env[1201]: time="2025-08-13T03:49:01.943390668Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:49:01.962419 env[1201]: time="2025-08-13T03:49:01.951217332Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dc4ea8b409b85d2f118bb4677ad3d34b57e7b01d488c9f019f7073bb58b2162b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:49:01.962419 env[1201]: time="2025-08-13T03:49:01.955582228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:49:01.963452 env[1201]: time="2025-08-13T03:49:01.962816544Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:a2b761fd93d824431ad93e59e8e670cdf00b478f4b532145297e1e67f2768305,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:49:01.964783 env[1201]: time="2025-08-13T03:49:01.963897909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.2\" returns image reference \"sha256:dc4ea8b409b85d2f118bb4677ad3d34b57e7b01d488c9f019f7073bb58b2162b\"" Aug 13 03:49:01.996551 env[1201]: time="2025-08-13T03:49:01.996493074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.2\"" Aug 13 03:49:02.121802 env[1201]: time="2025-08-13T03:49:02.121625097Z" level=info msg="CreateContainer within sandbox \"197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Aug 13 03:49:02.183579 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount283694405.mount: Deactivated successfully. Aug 13 03:49:02.187896 env[1201]: time="2025-08-13T03:49:02.187817423Z" level=info msg="CreateContainer within sandbox \"197ad7a56af6629d4715ed6bc3d2f9aa2a050b00b813a37c295af1774c15a41b\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3\"" Aug 13 03:49:02.209327 env[1201]: time="2025-08-13T03:49:02.206782276Z" level=info msg="StartContainer for \"d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3\"" Aug 13 03:49:02.308731 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.HqIxsp.mount: Deactivated successfully. Aug 13 03:49:02.377583 systemd[1]: Started cri-containerd-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3.scope. Aug 13 03:49:02.415813 kernel: kauditd_printk_skb: 99 callbacks suppressed Aug 13 03:49:02.419430 kernel: audit: type=1400 audit(1755056942.403:1443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.429514 kernel: audit: type=1400 audit(1755056942.403:1444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.441964 kernel: audit: type=1400 audit(1755056942.414:1445): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.458952 kernel: audit: type=1400 audit(1755056942.414:1446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.468968 kernel: audit: type=1400 audit(1755056942.414:1447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.482951 kernel: audit: type=1400 audit(1755056942.414:1448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.493070 kernel: audit: type=1400 audit(1755056942.414:1449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.498952 kernel: audit: type=1400 audit(1755056942.414:1450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.506954 kernel: audit: type=1400 audit(1755056942.414:1451): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.513964 kernel: audit: type=1400 audit(1755056942.414:1452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.414000 audit: BPF prog-id=226 op=LOAD Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4018 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:02.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383761666132343435633063366538356463386332653833326363 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4018 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:02.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383761666132343435633063366538356463386332653833326363 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit: BPF prog-id=227 op=LOAD Aug 13 03:49:02.417000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000282f10 items=0 ppid=4018 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:02.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383761666132343435633063366538356463386332653833326363 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.417000 audit: BPF prog-id=228 op=LOAD Aug 13 03:49:02.417000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000282f58 items=0 ppid=4018 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:02.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383761666132343435633063366538356463386332653833326363 Aug 13 03:49:02.418000 audit: BPF prog-id=228 op=UNLOAD Aug 13 03:49:02.418000 audit: BPF prog-id=227 op=UNLOAD Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:02.418000 audit: BPF prog-id=229 op=LOAD Aug 13 03:49:02.418000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000283368 items=0 ppid=4018 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:02.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383761666132343435633063366538356463386332653833326363 Aug 13 03:49:02.567823 env[1201]: time="2025-08-13T03:49:02.567739034Z" level=info msg="StartContainer for \"d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3\" returns successfully" Aug 13 03:49:02.949032 kubelet[1983]: I0813 03:49:02.943064 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-58fd7646b9-655n6" podStartSLOduration=36.53908821 podStartE2EDuration="1m2.930207712s" podCreationTimestamp="2025-08-13 03:48:00 +0000 UTC" firstStartedPulling="2025-08-13 03:48:35.612900361 +0000 UTC m=+57.371806139" lastFinishedPulling="2025-08-13 03:49:02.004019853 +0000 UTC m=+83.762925641" observedRunningTime="2025-08-13 03:49:02.909593338 +0000 UTC m=+84.668499124" watchObservedRunningTime="2025-08-13 03:49:02.930207712 +0000 UTC m=+84.689113513" Aug 13 03:49:03.497000 audit[4929]: NETFILTER_CFG table=filter:120 family=2 entries=12 op=nft_register_rule pid=4929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:03.497000 audit[4929]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffea1c39650 a2=0 a3=7ffea1c3963c items=0 ppid=2131 pid=4929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:03.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:03.507000 audit[4929]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=4929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:03.507000 audit[4929]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffea1c39650 a2=0 a3=7ffea1c3963c items=0 ppid=2131 pid=4929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:03.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:03.949164 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.jPTc8B.mount: Deactivated successfully. Aug 13 03:49:04.540775 systemd[1]: Started sshd@7-10.244.16.30:22-139.178.89.65:60168.service. Aug 13 03:49:04.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.16.30:22-139.178.89.65:60168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:05.650000 audit[4954]: USER_ACCT pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:05.657000 audit[4954]: CRED_ACQ pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:05.657000 audit[4954]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff441e29d0 a2=3 a3=0 items=0 ppid=1 pid=4954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:05.657000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:49:05.734092 sshd[4954]: Accepted publickey for core from 139.178.89.65 port 60168 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:49:05.666204 sshd[4954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:49:05.825055 systemd-logind[1192]: New session 8 of user core. Aug 13 03:49:05.839000 audit[4954]: USER_START pid=4954 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:05.844000 audit[4961]: CRED_ACQ pid=4961 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:05.830661 systemd[1]: Started session-8.scope. Aug 13 03:49:07.036518 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3118785892.mount: Deactivated successfully. Aug 13 03:49:07.096355 env[1201]: time="2025-08-13T03:49:07.096267427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:49:07.110063 env[1201]: time="2025-08-13T03:49:07.110000351Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6ba7e39edcd8be6d32dfccbfdb65533a727b14a19173515e91607d4259f8ee7f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:49:07.119003 env[1201]: time="2025-08-13T03:49:07.118919922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:49:07.126483 env[1201]: time="2025-08-13T03:49:07.126402444Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:fbf7f21f5aba95930803ad7e7dea8b083220854eae72c2a7c51681c09c5614b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 03:49:07.127947 env[1201]: time="2025-08-13T03:49:07.127892383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.2\" returns image reference \"sha256:6ba7e39edcd8be6d32dfccbfdb65533a727b14a19173515e91607d4259f8ee7f\"" Aug 13 03:49:07.866833 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.3rYAhj.mount: Deactivated successfully. Aug 13 03:49:08.424875 env[1201]: time="2025-08-13T03:49:08.423132925Z" level=info msg="CreateContainer within sandbox \"aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Aug 13 03:49:08.461668 env[1201]: time="2025-08-13T03:49:08.461595166Z" level=info msg="CreateContainer within sandbox \"aef74fc48f42381be0add75290799d3a7dc951f5e9f0f0590852b5fe542e7320\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"d6c8a82b72d3bb55b6454a72b173c6134e61c532d9c2316ae690cf14f7a0fa4c\"" Aug 13 03:49:08.462488 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount737663076.mount: Deactivated successfully. Aug 13 03:49:08.498894 env[1201]: time="2025-08-13T03:49:08.498073303Z" level=info msg="StartContainer for \"d6c8a82b72d3bb55b6454a72b173c6134e61c532d9c2316ae690cf14f7a0fa4c\"" Aug 13 03:49:08.562594 systemd[1]: run-containerd-runc-k8s.io-d6c8a82b72d3bb55b6454a72b173c6134e61c532d9c2316ae690cf14f7a0fa4c-runc.uEI59N.mount: Deactivated successfully. Aug 13 03:49:08.636302 systemd[1]: Started cri-containerd-d6c8a82b72d3bb55b6454a72b173c6134e61c532d9c2316ae690cf14f7a0fa4c.scope. Aug 13 03:49:08.778744 kernel: kauditd_printk_skb: 61 callbacks suppressed Aug 13 03:49:08.792734 kernel: audit: type=1400 audit(1755056948.767:1469): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.793768 kernel: audit: type=1400 audit(1755056948.767:1470): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.844522 kernel: audit: type=1400 audit(1755056948.767:1471): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.844660 kernel: audit: type=1400 audit(1755056948.767:1472): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.848598 kernel: audit: type=1400 audit(1755056948.767:1473): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.851109 kernel: audit: type=1400 audit(1755056948.767:1474): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.851221 kernel: audit: type=1400 audit(1755056948.767:1475): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.851278 kernel: audit: type=1400 audit(1755056948.767:1476): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.852341 kernel: audit: type=1400 audit(1755056948.767:1477): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.852402 kernel: audit: type=1400 audit(1755056948.772:1478): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.772000 audit: BPF prog-id=230 op=LOAD Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3597 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:08.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633861383262373264336262353562363435346137326231373363 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3597 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:08.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633861383262373264336262353562363435346137326231373363 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.778000 audit: BPF prog-id=231 op=LOAD Aug 13 03:49:08.778000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000358900 items=0 ppid=3597 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:08.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633861383262373264336262353562363435346137326231373363 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit: BPF prog-id=232 op=LOAD Aug 13 03:49:08.779000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000358948 items=0 ppid=3597 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:08.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633861383262373264336262353562363435346137326231373363 Aug 13 03:49:08.779000 audit: BPF prog-id=232 op=UNLOAD Aug 13 03:49:08.779000 audit: BPF prog-id=231 op=UNLOAD Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 03:49:08.779000 audit: BPF prog-id=233 op=LOAD Aug 13 03:49:08.779000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000358d58 items=0 ppid=3597 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:08.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633861383262373264336262353562363435346137326231373363 Aug 13 03:49:09.116100 env[1201]: time="2025-08-13T03:49:09.115804569Z" level=info msg="StartContainer for \"d6c8a82b72d3bb55b6454a72b173c6134e61c532d9c2316ae690cf14f7a0fa4c\" returns successfully" Aug 13 03:49:09.804116 sshd[4954]: pam_unix(sshd:session): session closed for user core Aug 13 03:49:09.853000 audit[4954]: USER_END pid=4954 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:09.854000 audit[4954]: CRED_DISP pid=4954 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:09.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.16.30:22-139.178.89.65:60168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:09.868259 systemd[1]: sshd@7-10.244.16.30:22-139.178.89.65:60168.service: Deactivated successfully. Aug 13 03:49:09.870808 systemd[1]: session-8.scope: Deactivated successfully. Aug 13 03:49:09.873785 systemd-logind[1192]: Session 8 logged out. Waiting for processes to exit. Aug 13 03:49:09.877706 systemd-logind[1192]: Removed session 8. Aug 13 03:49:10.434687 kubelet[1983]: I0813 03:49:10.426210 1983 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-5565b65ff7-z429c" podStartSLOduration=5.745933497 podStartE2EDuration="39.399086419s" podCreationTimestamp="2025-08-13 03:48:31 +0000 UTC" firstStartedPulling="2025-08-13 03:48:33.649669213 +0000 UTC m=+55.408574992" lastFinishedPulling="2025-08-13 03:49:07.302822093 +0000 UTC m=+89.061727914" observedRunningTime="2025-08-13 03:49:10.355174044 +0000 UTC m=+92.114079832" watchObservedRunningTime="2025-08-13 03:49:10.399086419 +0000 UTC m=+92.157992205" Aug 13 03:49:10.692000 audit[5027]: NETFILTER_CFG table=filter:122 family=2 entries=11 op=nft_register_rule pid=5027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:10.692000 audit[5027]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe8144b880 a2=0 a3=7ffe8144b86c items=0 ppid=2131 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:10.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:10.709000 audit[5027]: NETFILTER_CFG table=nat:123 family=2 entries=29 op=nft_register_chain pid=5027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:10.709000 audit[5027]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffe8144b880 a2=0 a3=7ffe8144b86c items=0 ppid=2131 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:10.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:13.149856 kubelet[1983]: I0813 03:49:13.140815 1983 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Aug 13 03:49:13.771000 audit[5029]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=5029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:13.809191 kernel: kauditd_printk_skb: 56 callbacks suppressed Aug 13 03:49:13.814009 kernel: audit: type=1325 audit(1755056953.771:1492): table=filter:124 family=2 entries=10 op=nft_register_rule pid=5029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:13.814488 kernel: audit: type=1300 audit(1755056953.771:1492): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffeb2fdbfc0 a2=0 a3=7ffeb2fdbfac items=0 ppid=2131 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:13.814588 kernel: audit: type=1327 audit(1755056953.771:1492): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:13.814712 kernel: audit: type=1325 audit(1755056953.809:1493): table=nat:125 family=2 entries=36 op=nft_register_chain pid=5029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:13.771000 audit[5029]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffeb2fdbfc0 a2=0 a3=7ffeb2fdbfac items=0 ppid=2131 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:13.830649 kernel: audit: type=1300 audit(1755056953.809:1493): arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffeb2fdbfc0 a2=0 a3=7ffeb2fdbfac items=0 ppid=2131 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:13.830794 kernel: audit: type=1327 audit(1755056953.809:1493): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:13.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:13.809000 audit[5029]: NETFILTER_CFG table=nat:125 family=2 entries=36 op=nft_register_chain pid=5029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:13.809000 audit[5029]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffeb2fdbfc0 a2=0 a3=7ffeb2fdbfac items=0 ppid=2131 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:13.809000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:14.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.16.30:22-139.178.89.65:48870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:14.988086 kernel: audit: type=1130 audit(1755056954.968:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.16.30:22-139.178.89.65:48870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:14.967382 systemd[1]: Started sshd@8-10.244.16.30:22-139.178.89.65:48870.service. Aug 13 03:49:15.703197 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.pHdJIN.mount: Deactivated successfully. Aug 13 03:49:16.167000 audit[5031]: USER_ACCT pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:16.178996 sshd[5031]: Accepted publickey for core from 139.178.89.65 port 48870 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:49:16.185483 kernel: audit: type=1101 audit(1755056956.167:1495): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:16.186588 kernel: audit: type=1103 audit(1755056956.182:1496): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:16.182000 audit[5031]: CRED_ACQ pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:16.195955 kernel: audit: type=1006 audit(1755056956.182:1497): pid=5031 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Aug 13 03:49:16.199141 sshd[5031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:49:16.182000 audit[5031]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd123500f0 a2=3 a3=0 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:16.182000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:49:16.250696 systemd-logind[1192]: New session 9 of user core. Aug 13 03:49:16.256350 systemd[1]: Started session-9.scope. Aug 13 03:49:16.276000 audit[5031]: USER_START pid=5031 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:16.279000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:18.422000 audit[5091]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=5091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:18.422000 audit[5091]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc6c235df0 a2=0 a3=7ffc6c235ddc items=0 ppid=2131 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:18.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:18.431000 audit[5091]: NETFILTER_CFG table=nat:127 family=2 entries=31 op=nft_register_chain pid=5091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:49:18.431000 audit[5091]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffc6c235df0 a2=0 a3=7ffc6c235ddc items=0 ppid=2131 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:18.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:49:20.256497 kubelet[1983]: E0813 03:49:20.226380 1983 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.1s" Aug 13 03:49:20.856067 sshd[5031]: pam_unix(sshd:session): session closed for user core Aug 13 03:49:20.927266 kernel: kauditd_printk_skb: 10 callbacks suppressed Aug 13 03:49:20.929026 kernel: audit: type=1106 audit(1755056960.915:1502): pid=5031 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:20.915000 audit[5031]: USER_END pid=5031 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:20.933000 audit[5031]: CRED_DISP pid=5031 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:20.946007 kernel: audit: type=1104 audit(1755056960.933:1503): pid=5031 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:20.968056 systemd[1]: sshd@8-10.244.16.30:22-139.178.89.65:48870.service: Deactivated successfully. Aug 13 03:49:20.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.16.30:22-139.178.89.65:48870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:20.976961 kernel: audit: type=1131 audit(1755056960.967:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.16.30:22-139.178.89.65:48870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:20.978128 systemd[1]: session-9.scope: Deactivated successfully. Aug 13 03:49:20.978553 systemd[1]: session-9.scope: Consumed 1.125s CPU time. Aug 13 03:49:20.979772 systemd-logind[1192]: Session 9 logged out. Waiting for processes to exit. Aug 13 03:49:20.990003 systemd-logind[1192]: Removed session 9. Aug 13 03:49:25.999941 systemd[1]: Started sshd@9-10.244.16.30:22-139.178.89.65:38618.service. Aug 13 03:49:26.038300 kernel: audit: type=1130 audit(1755056965.999:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.16.30:22-139.178.89.65:38618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:25.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.16.30:22-139.178.89.65:38618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:26.995000 audit[5118]: USER_ACCT pid=5118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:26.998707 sshd[5118]: Accepted publickey for core from 139.178.89.65 port 38618 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:49:27.004001 kernel: audit: type=1101 audit(1755056966.995:1506): pid=5118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:27.012092 kernel: audit: type=1103 audit(1755056967.003:1507): pid=5118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:27.003000 audit[5118]: CRED_ACQ pid=5118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:27.006542 sshd[5118]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:49:27.025607 kernel: audit: type=1006 audit(1755056967.003:1508): pid=5118 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Aug 13 03:49:27.025732 kernel: audit: type=1300 audit(1755056967.003:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff440b1740 a2=3 a3=0 items=0 ppid=1 pid=5118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:27.003000 audit[5118]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff440b1740 a2=3 a3=0 items=0 ppid=1 pid=5118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:27.039182 kernel: audit: type=1327 audit(1755056967.003:1508): proctitle=737368643A20636F7265205B707269765D Aug 13 03:49:27.003000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:49:27.074192 systemd-logind[1192]: New session 10 of user core. Aug 13 03:49:27.076125 systemd[1]: Started session-10.scope. Aug 13 03:49:27.087000 audit[5118]: USER_START pid=5118 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:27.100049 kernel: audit: type=1105 audit(1755056967.087:1509): pid=5118 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:27.100000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:27.107969 kernel: audit: type=1103 audit(1755056967.100:1510): pid=5120 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:28.408199 sshd[5118]: pam_unix(sshd:session): session closed for user core Aug 13 03:49:28.417000 audit[5118]: USER_END pid=5118 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:28.430969 kernel: audit: type=1106 audit(1755056968.417:1511): pid=5118 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:28.431297 kernel: audit: type=1104 audit(1755056968.422:1512): pid=5118 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:28.422000 audit[5118]: CRED_DISP pid=5118 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:28.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.16.30:22-139.178.89.65:38618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:28.444437 systemd[1]: sshd@9-10.244.16.30:22-139.178.89.65:38618.service: Deactivated successfully. Aug 13 03:49:28.449001 systemd[1]: session-10.scope: Deactivated successfully. Aug 13 03:49:28.450592 systemd-logind[1192]: Session 10 logged out. Waiting for processes to exit. Aug 13 03:49:28.456590 systemd-logind[1192]: Removed session 10. Aug 13 03:49:31.566000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:31.575603 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:49:31.576947 kernel: audit: type=1400 audit(1755056971.566:1514): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:31.566000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d54480 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:31.587989 kernel: audit: type=1300 audit(1755056971.566:1514): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d54480 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:31.566000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:31.598158 kernel: audit: type=1400 audit(1755056971.566:1515): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:31.598757 kernel: audit: type=1300 audit(1755056971.566:1515): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001925180 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:31.566000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001925180 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:31.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:31.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:31.622387 kernel: audit: type=1327 audit(1755056971.566:1515): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:31.622563 kernel: audit: type=1327 audit(1755056971.566:1514): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:33.344000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:33.356957 kernel: audit: type=1400 audit(1755056973.344:1516): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:33.344000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c005bfd6e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:49:33.366958 kernel: audit: type=1300 audit(1755056973.344:1516): arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c005bfd6e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:49:33.367511 kernel: audit: type=1327 audit(1755056973.344:1516): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:49:33.344000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:49:33.359000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:33.381962 kernel: audit: type=1400 audit(1755056973.359:1517): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:33.359000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c0080a6cc0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:49:33.359000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:49:33.362000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:33.362000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00637a090 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:49:33.362000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:49:33.362000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:33.362000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00637a0f0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:49:33.362000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:49:33.466000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:33.466000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f187b60 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:49:33.466000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:49:33.466000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:33.466000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c004f106e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:49:33.466000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:49:33.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.16.30:22-139.178.89.65:33872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:33.605381 systemd[1]: Started sshd@10-10.244.16.30:22-139.178.89.65:33872.service. Aug 13 03:49:34.626949 sshd[5133]: Accepted publickey for core from 139.178.89.65 port 33872 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:49:34.625000 audit[5133]: USER_ACCT pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:34.629000 audit[5133]: CRED_ACQ pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:34.629000 audit[5133]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff745f6120 a2=3 a3=0 items=0 ppid=1 pid=5133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:34.629000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:49:34.634304 sshd[5133]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:49:34.655366 systemd-logind[1192]: New session 11 of user core. Aug 13 03:49:34.656192 systemd[1]: Started session-11.scope. Aug 13 03:49:34.665000 audit[5133]: USER_START pid=5133 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:34.667000 audit[5135]: CRED_ACQ pid=5135 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:36.313032 sshd[5133]: pam_unix(sshd:session): session closed for user core Aug 13 03:49:36.319000 audit[5133]: USER_END pid=5133 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:36.319000 audit[5133]: CRED_DISP pid=5133 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:36.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.16.30:22-139.178.89.65:33872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:36.350123 systemd[1]: sshd@10-10.244.16.30:22-139.178.89.65:33872.service: Deactivated successfully. Aug 13 03:49:36.354154 systemd[1]: session-11.scope: Deactivated successfully. Aug 13 03:49:36.355765 systemd-logind[1192]: Session 11 logged out. Waiting for processes to exit. Aug 13 03:49:36.357730 systemd-logind[1192]: Removed session 11. Aug 13 03:49:40.080784 kernel: kauditd_printk_skb: 25 callbacks suppressed Aug 13 03:49:40.095641 kernel: audit: type=1400 audit(1755056980.072:1531): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:40.097223 kernel: audit: type=1400 audit(1755056980.076:1532): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:40.072000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:40.076000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:40.076000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00177f200 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:40.134836 kernel: audit: type=1300 audit(1755056980.076:1532): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00177f200 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:40.134987 kernel: audit: type=1327 audit(1755056980.076:1532): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:40.076000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:40.072000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028de160 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:40.072000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:40.153709 kernel: audit: type=1300 audit(1755056980.072:1531): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028de160 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:40.154625 kernel: audit: type=1327 audit(1755056980.072:1531): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:40.154711 kernel: audit: type=1400 audit(1755056980.084:1533): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:40.084000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:40.084000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00177f220 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:40.168934 kernel: audit: type=1300 audit(1755056980.084:1533): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00177f220 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:40.169150 kernel: audit: type=1327 audit(1755056980.084:1533): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:40.084000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:40.094000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:40.182404 kernel: audit: type=1400 audit(1755056980.094:1534): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:49:40.094000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028de180 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:49:40.094000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:49:41.452023 systemd[1]: Started sshd@11-10.244.16.30:22-139.178.89.65:40226.service. Aug 13 03:49:41.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.16.30:22-139.178.89.65:40226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:42.387861 env[1201]: time="2025-08-13T03:49:42.386895358Z" level=info msg="StopPodSandbox for \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\"" Aug 13 03:49:42.459000 audit[5166]: USER_ACCT pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:42.481624 sshd[5166]: Accepted publickey for core from 139.178.89.65 port 40226 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:49:42.502000 audit[5166]: CRED_ACQ pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:42.502000 audit[5166]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff6394620 a2=3 a3=0 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:42.502000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:49:42.510252 sshd[5166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:49:42.654979 systemd-logind[1192]: New session 12 of user core. Aug 13 03:49:42.658854 systemd[1]: Started session-12.scope. Aug 13 03:49:42.691000 audit[5166]: USER_START pid=5166 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:42.709000 audit[5181]: CRED_ACQ pid=5181 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.347 [WARNING][5176] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"664fd2b9-697f-4cfb-8f6b-6e658389fb36", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb", Pod:"coredns-7c65d6cfc9-wnjbx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.70.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1ffbff4362", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.355 [INFO][5176] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.356 [INFO][5176] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" iface="eth0" netns="" Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.356 [INFO][5176] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.356 [INFO][5176] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.667 [INFO][5188] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" HandleID="k8s-pod-network.f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.673 [INFO][5188] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.674 [INFO][5188] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.812 [WARNING][5188] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" HandleID="k8s-pod-network.f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.812 [INFO][5188] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" HandleID="k8s-pod-network.f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.839 [INFO][5188] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:49:43.854653 env[1201]: 2025-08-13 03:49:43.845 [INFO][5176] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:49:43.854653 env[1201]: time="2025-08-13T03:49:43.852531751Z" level=info msg="TearDown network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\" successfully" Aug 13 03:49:43.854653 env[1201]: time="2025-08-13T03:49:43.852582940Z" level=info msg="StopPodSandbox for \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\" returns successfully" Aug 13 03:49:45.637000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:49:45.717215 kernel: kauditd_printk_skb: 10 callbacks suppressed Aug 13 03:49:45.723475 kernel: audit: type=1400 audit(1755056985.637:1541): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:49:45.724182 kernel: audit: type=1300 audit(1755056985.637:1541): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0020093e0 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:49:45.724466 kernel: audit: type=1327 audit(1755056985.637:1541): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:49:45.637000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0020093e0 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:49:45.637000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:49:46.028702 env[1201]: time="2025-08-13T03:49:46.028465264Z" level=info msg="RemovePodSandbox for \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\"" Aug 13 03:49:46.028702 env[1201]: time="2025-08-13T03:49:46.028566860Z" level=info msg="Forcibly stopping sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\"" Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:46.897 [WARNING][5209] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"664fd2b9-697f-4cfb-8f6b-6e658389fb36", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 3, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-amtey.gb1.brightbox.com", ContainerID:"f7095c50e85ee224a32d5f46ef384d05f3d0386bace260d1ae94f352c94d89fb", Pod:"coredns-7c65d6cfc9-wnjbx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.70.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1ffbff4362", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:46.918 [INFO][5209] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:46.918 [INFO][5209] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" iface="eth0" netns="" Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:46.921 [INFO][5209] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:46.921 [INFO][5209] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:47.487 [INFO][5236] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" HandleID="k8s-pod-network.f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:47.491 [INFO][5236] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:47.493 [INFO][5236] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:47.533 [WARNING][5236] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" HandleID="k8s-pod-network.f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:47.533 [INFO][5236] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" HandleID="k8s-pod-network.f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Workload="srv--amtey.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--wnjbx-eth0" Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:47.555 [INFO][5236] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 03:49:47.573635 env[1201]: 2025-08-13 03:49:47.563 [INFO][5209] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b" Aug 13 03:49:47.573635 env[1201]: time="2025-08-13T03:49:47.575644740Z" level=info msg="TearDown network for sandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\" successfully" Aug 13 03:49:47.643696 env[1201]: time="2025-08-13T03:49:47.593977976Z" level=info msg="RemovePodSandbox \"f642b9f13d7c33e764e6a14ab36c593bb58690e88885586045cffc132561914b\" returns successfully" Aug 13 03:49:49.626956 kubelet[1983]: E0813 03:49:49.626825 1983 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="4.297s" Aug 13 03:49:49.706086 sshd[5166]: pam_unix(sshd:session): session closed for user core Aug 13 03:49:49.728000 audit[5166]: USER_END pid=5166 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:49.751606 kernel: audit: type=1106 audit(1755056989.728:1542): pid=5166 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:49.755195 kernel: audit: type=1104 audit(1755056989.741:1543): pid=5166 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:49.741000 audit[5166]: CRED_DISP pid=5166 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:49.777870 systemd[1]: sshd@11-10.244.16.30:22-139.178.89.65:40226.service: Deactivated successfully. Aug 13 03:49:49.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.16.30:22-139.178.89.65:40226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:49.791014 kernel: audit: type=1131 audit(1755056989.779:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.16.30:22-139.178.89.65:40226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:49.792435 systemd[1]: session-12.scope: Deactivated successfully. Aug 13 03:49:49.792751 systemd[1]: session-12.scope: Consumed 1.535s CPU time. Aug 13 03:49:49.794549 systemd-logind[1192]: Session 12 logged out. Waiting for processes to exit. Aug 13 03:49:49.802018 systemd-logind[1192]: Removed session 12. Aug 13 03:49:50.908402 systemd[1]: run-containerd-runc-k8s.io-f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82-runc.pLHHW2.mount: Deactivated successfully. Aug 13 03:49:54.866892 systemd[1]: Started sshd@12-10.244.16.30:22-139.178.89.65:34862.service. Aug 13 03:49:54.895887 kernel: audit: type=1130 audit(1755056994.867:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.16.30:22-139.178.89.65:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:54.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.16.30:22-139.178.89.65:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:55.286000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:49:55.312338 kernel: audit: type=1400 audit(1755056995.286:1546): avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:49:55.312503 kernel: audit: type=1300 audit(1755056995.286:1546): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002952de0 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:49:55.286000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002952de0 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:49:55.318102 kernel: audit: type=1327 audit(1755056995.286:1546): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:49:55.286000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:49:55.857000 audit[5306]: USER_ACCT pid=5306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:55.869571 kernel: audit: type=1101 audit(1755056995.857:1547): pid=5306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:55.869693 sshd[5306]: Accepted publickey for core from 139.178.89.65 port 34862 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:49:55.879416 kernel: audit: type=1103 audit(1755056995.870:1548): pid=5306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:55.879544 kernel: audit: type=1006 audit(1755056995.870:1549): pid=5306 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Aug 13 03:49:55.870000 audit[5306]: CRED_ACQ pid=5306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:55.870000 audit[5306]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5607d8c0 a2=3 a3=0 items=0 ppid=1 pid=5306 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:55.890177 kernel: audit: type=1300 audit(1755056995.870:1549): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5607d8c0 a2=3 a3=0 items=0 ppid=1 pid=5306 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:49:55.870000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:49:55.892910 kernel: audit: type=1327 audit(1755056995.870:1549): proctitle=737368643A20636F7265205B707269765D Aug 13 03:49:55.893446 sshd[5306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:49:55.954245 systemd-logind[1192]: New session 13 of user core. Aug 13 03:49:55.954962 systemd[1]: Started session-13.scope. Aug 13 03:49:55.972000 audit[5306]: USER_START pid=5306 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:55.982965 kernel: audit: type=1105 audit(1755056995.972:1550): pid=5306 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:55.982000 audit[5308]: CRED_ACQ pid=5308 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:57.665715 sshd[5306]: pam_unix(sshd:session): session closed for user core Aug 13 03:49:57.669000 audit[5306]: USER_END pid=5306 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:57.669000 audit[5306]: CRED_DISP pid=5306 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:49:57.672966 systemd[1]: sshd@12-10.244.16.30:22-139.178.89.65:34862.service: Deactivated successfully. Aug 13 03:49:57.675269 systemd[1]: session-13.scope: Deactivated successfully. Aug 13 03:49:57.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.16.30:22-139.178.89.65:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:49:57.676653 systemd-logind[1192]: Session 13 logged out. Waiting for processes to exit. Aug 13 03:49:57.679010 systemd-logind[1192]: Removed session 13. Aug 13 03:50:02.856312 systemd[1]: Started sshd@13-10.244.16.30:22-139.178.89.65:49706.service. Aug 13 03:50:02.870185 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:50:02.872814 kernel: audit: type=1130 audit(1755057002.862:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.16.30:22-139.178.89.65:49706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:02.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.16.30:22-139.178.89.65:49706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:04.057000 audit[5327]: USER_ACCT pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:04.106655 kernel: audit: type=1101 audit(1755057004.057:1556): pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:04.107518 kernel: audit: type=1103 audit(1755057004.082:1557): pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:04.107941 kernel: audit: type=1006 audit(1755057004.082:1558): pid=5327 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Aug 13 03:50:04.110056 kernel: audit: type=1300 audit(1755057004.082:1558): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeacc6950 a2=3 a3=0 items=0 ppid=1 pid=5327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:04.111895 kernel: audit: type=1327 audit(1755057004.082:1558): proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:04.082000 audit[5327]: CRED_ACQ pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:04.082000 audit[5327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeacc6950 a2=3 a3=0 items=0 ppid=1 pid=5327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:04.082000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:04.184153 sshd[5327]: Accepted publickey for core from 139.178.89.65 port 49706 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:50:04.109322 sshd[5327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:50:04.211610 systemd-logind[1192]: New session 14 of user core. Aug 13 03:50:04.214099 systemd[1]: Started session-14.scope. Aug 13 03:50:04.226000 audit[5327]: USER_START pid=5327 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:04.237976 kernel: audit: type=1105 audit(1755057004.226:1559): pid=5327 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:04.238000 audit[5329]: CRED_ACQ pid=5329 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:04.247950 kernel: audit: type=1103 audit(1755057004.238:1560): pid=5329 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:06.404000 audit[5327]: USER_END pid=5327 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:06.419697 kernel: audit: type=1106 audit(1755057006.404:1561): pid=5327 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:06.423091 kernel: audit: type=1104 audit(1755057006.404:1562): pid=5327 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:06.404000 audit[5327]: CRED_DISP pid=5327 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:06.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.16.30:22-139.178.89.65:49706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:06.407081 sshd[5327]: pam_unix(sshd:session): session closed for user core Aug 13 03:50:06.420028 systemd[1]: sshd@13-10.244.16.30:22-139.178.89.65:49706.service: Deactivated successfully. Aug 13 03:50:06.428302 systemd[1]: session-14.scope: Deactivated successfully. Aug 13 03:50:06.429515 systemd-logind[1192]: Session 14 logged out. Waiting for processes to exit. Aug 13 03:50:06.431443 systemd-logind[1192]: Removed session 14. Aug 13 03:50:11.596774 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:50:11.605106 kernel: audit: type=1130 audit(1755057011.585:1564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.16.30:22-139.178.89.65:60120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:11.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.16.30:22-139.178.89.65:60120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:11.585672 systemd[1]: Started sshd@14-10.244.16.30:22-139.178.89.65:60120.service. Aug 13 03:50:12.597000 audit[5354]: USER_ACCT pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:12.611633 kernel: audit: type=1101 audit(1755057012.597:1565): pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:12.612056 kernel: audit: type=1103 audit(1755057012.609:1566): pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:12.609000 audit[5354]: CRED_ACQ pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:12.613091 sshd[5354]: Accepted publickey for core from 139.178.89.65 port 60120 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:50:12.618361 sshd[5354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:50:12.621186 kernel: audit: type=1006 audit(1755057012.609:1567): pid=5354 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Aug 13 03:50:12.609000 audit[5354]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4b473780 a2=3 a3=0 items=0 ppid=1 pid=5354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:12.630025 kernel: audit: type=1300 audit(1755057012.609:1567): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4b473780 a2=3 a3=0 items=0 ppid=1 pid=5354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:12.630123 kernel: audit: type=1327 audit(1755057012.609:1567): proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:12.609000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:12.649088 systemd-logind[1192]: New session 15 of user core. Aug 13 03:50:12.650109 systemd[1]: Started session-15.scope. Aug 13 03:50:12.661000 audit[5354]: USER_START pid=5354 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:12.669961 kernel: audit: type=1105 audit(1755057012.661:1568): pid=5354 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:12.669000 audit[5362]: CRED_ACQ pid=5362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:12.676975 kernel: audit: type=1103 audit(1755057012.669:1569): pid=5362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:14.304540 sshd[5354]: pam_unix(sshd:session): session closed for user core Aug 13 03:50:14.327116 kernel: audit: type=1106 audit(1755057014.308:1570): pid=5354 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:14.328667 kernel: audit: type=1104 audit(1755057014.308:1571): pid=5354 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:14.308000 audit[5354]: USER_END pid=5354 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:14.308000 audit[5354]: CRED_DISP pid=5354 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:14.330853 systemd[1]: sshd@14-10.244.16.30:22-139.178.89.65:60120.service: Deactivated successfully. Aug 13 03:50:14.333757 systemd[1]: session-15.scope: Deactivated successfully. Aug 13 03:50:14.334694 systemd-logind[1192]: Session 15 logged out. Waiting for processes to exit. Aug 13 03:50:14.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.16.30:22-139.178.89.65:60120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:14.336439 systemd-logind[1192]: Removed session 15. Aug 13 03:50:19.471920 systemd[1]: Started sshd@15-10.244.16.30:22-139.178.89.65:60622.service. Aug 13 03:50:19.485677 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:50:19.491228 kernel: audit: type=1130 audit(1755057019.471:1573): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.16.30:22-139.178.89.65:60622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:19.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.16.30:22-139.178.89.65:60622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:20.486000 audit[5416]: USER_ACCT pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:20.498481 sshd[5416]: Accepted publickey for core from 139.178.89.65 port 60622 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:50:20.508367 kernel: audit: type=1101 audit(1755057020.486:1574): pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:20.508517 kernel: audit: type=1103 audit(1755057020.503:1575): pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:20.503000 audit[5416]: CRED_ACQ pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:20.522545 kernel: audit: type=1006 audit(1755057020.503:1576): pid=5416 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Aug 13 03:50:20.523023 kernel: audit: type=1300 audit(1755057020.503:1576): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc729b8c00 a2=3 a3=0 items=0 ppid=1 pid=5416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:20.523383 kernel: audit: type=1327 audit(1755057020.503:1576): proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:20.503000 audit[5416]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc729b8c00 a2=3 a3=0 items=0 ppid=1 pid=5416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:20.503000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:20.526686 sshd[5416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:50:20.551855 systemd[1]: Started session-16.scope. Aug 13 03:50:20.554609 systemd-logind[1192]: New session 16 of user core. Aug 13 03:50:20.567000 audit[5416]: USER_START pid=5416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:20.579954 kernel: audit: type=1105 audit(1755057020.567:1577): pid=5416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:20.579000 audit[5418]: CRED_ACQ pid=5418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:20.586979 kernel: audit: type=1103 audit(1755057020.579:1578): pid=5418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:22.603869 sshd[5416]: pam_unix(sshd:session): session closed for user core Aug 13 03:50:22.619000 audit[5416]: USER_END pid=5416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:22.645827 kernel: audit: type=1106 audit(1755057022.619:1579): pid=5416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:22.646874 kernel: audit: type=1104 audit(1755057022.644:1580): pid=5416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:22.644000 audit[5416]: CRED_DISP pid=5416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:22.659288 systemd[1]: sshd@15-10.244.16.30:22-139.178.89.65:60622.service: Deactivated successfully. Aug 13 03:50:22.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.16.30:22-139.178.89.65:60622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:22.664800 systemd[1]: session-16.scope: Deactivated successfully. Aug 13 03:50:22.666056 systemd-logind[1192]: Session 16 logged out. Waiting for processes to exit. Aug 13 03:50:22.673254 systemd-logind[1192]: Removed session 16. Aug 13 03:50:27.788307 systemd[1]: Started sshd@16-10.244.16.30:22-139.178.89.65:60626.service. Aug 13 03:50:27.811495 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:50:27.812366 kernel: audit: type=1130 audit(1755057027.788:1582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.16.30:22-139.178.89.65:60626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:27.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.16.30:22-139.178.89.65:60626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:28.809000 audit[5450]: USER_ACCT pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:28.838634 kernel: audit: type=1101 audit(1755057028.809:1583): pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:28.838802 kernel: audit: type=1103 audit(1755057028.819:1584): pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:28.844159 kernel: audit: type=1006 audit(1755057028.820:1585): pid=5450 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Aug 13 03:50:28.845025 kernel: audit: type=1300 audit(1755057028.820:1585): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb000de30 a2=3 a3=0 items=0 ppid=1 pid=5450 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:28.845646 kernel: audit: type=1327 audit(1755057028.820:1585): proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:28.819000 audit[5450]: CRED_ACQ pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:28.820000 audit[5450]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb000de30 a2=3 a3=0 items=0 ppid=1 pid=5450 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:28.820000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:28.856690 sshd[5450]: Accepted publickey for core from 139.178.89.65 port 60626 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:50:28.824817 sshd[5450]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:50:28.853342 systemd[1]: Started session-17.scope. Aug 13 03:50:28.854063 systemd-logind[1192]: New session 17 of user core. Aug 13 03:50:28.877231 kernel: audit: type=1105 audit(1755057028.867:1586): pid=5450 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:28.867000 audit[5450]: USER_START pid=5450 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:28.878000 audit[5452]: CRED_ACQ pid=5452 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:28.887123 kernel: audit: type=1103 audit(1755057028.878:1587): pid=5452 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:30.237435 sshd[5450]: pam_unix(sshd:session): session closed for user core Aug 13 03:50:30.240000 audit[5450]: USER_END pid=5450 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:30.254474 kernel: audit: type=1106 audit(1755057030.240:1588): pid=5450 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:30.258780 kernel: audit: type=1104 audit(1755057030.240:1589): pid=5450 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:30.240000 audit[5450]: CRED_DISP pid=5450 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:30.249971 systemd-logind[1192]: Session 17 logged out. Waiting for processes to exit. Aug 13 03:50:30.251840 systemd[1]: sshd@16-10.244.16.30:22-139.178.89.65:60626.service: Deactivated successfully. Aug 13 03:50:30.253485 systemd[1]: session-17.scope: Deactivated successfully. Aug 13 03:50:30.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.16.30:22-139.178.89.65:60626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:30.255690 systemd-logind[1192]: Removed session 17. Aug 13 03:50:31.580000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:31.580000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b8a1e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:50:31.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:50:31.581000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:31.581000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b5c480 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:50:31.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:50:33.354000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.361431 kernel: kauditd_printk_skb: 7 callbacks suppressed Aug 13 03:50:33.361599 kernel: audit: type=1400 audit(1755057033.354:1593): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.368022 kernel: audit: type=1400 audit(1755057033.361:1594): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.361000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.361000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c007798540 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:50:33.382540 kernel: audit: type=1300 audit(1755057033.361:1594): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c007798540 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:50:33.382758 kernel: audit: type=1327 audit(1755057033.361:1594): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:50:33.361000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:50:33.389571 kernel: audit: type=1300 audit(1755057033.354:1593): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00774b530 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:50:33.354000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00774b530 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:50:33.354000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:50:33.365000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.411754 kernel: audit: type=1327 audit(1755057033.354:1593): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:50:33.411959 kernel: audit: type=1400 audit(1755057033.365:1595): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.365000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00794fbc0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:50:33.421028 kernel: audit: type=1300 audit(1755057033.365:1595): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00794fbc0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:50:33.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:50:33.429011 kernel: audit: type=1327 audit(1755057033.365:1595): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:50:33.368000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.368000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00794fc20 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:50:33.368000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:50:33.439068 kernel: audit: type=1400 audit(1755057033.368:1596): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.467000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.467000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c005bd17d0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:50:33.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:50:33.468000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:33.468000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0051f9e60 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:50:33.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:50:35.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.16.30:22-139.178.89.65:40778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:35.420837 systemd[1]: Started sshd@17-10.244.16.30:22-139.178.89.65:40778.service. Aug 13 03:50:36.476227 sshd[5463]: Accepted publickey for core from 139.178.89.65 port 40778 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:50:36.475000 audit[5463]: USER_ACCT pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:36.479000 audit[5463]: CRED_ACQ pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:36.479000 audit[5463]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe642108c0 a2=3 a3=0 items=0 ppid=1 pid=5463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:36.479000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:36.482726 sshd[5463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:50:36.501345 systemd-logind[1192]: New session 18 of user core. Aug 13 03:50:36.504373 systemd[1]: Started session-18.scope. Aug 13 03:50:36.513000 audit[5463]: USER_START pid=5463 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:36.515000 audit[5465]: CRED_ACQ pid=5465 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:37.791165 sshd[5463]: pam_unix(sshd:session): session closed for user core Aug 13 03:50:37.795000 audit[5463]: USER_END pid=5463 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:37.795000 audit[5463]: CRED_DISP pid=5463 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:37.810254 systemd[1]: sshd@17-10.244.16.30:22-139.178.89.65:40778.service: Deactivated successfully. Aug 13 03:50:37.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.16.30:22-139.178.89.65:40778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:37.811493 systemd[1]: session-18.scope: Deactivated successfully. Aug 13 03:50:37.813147 systemd-logind[1192]: Session 18 logged out. Waiting for processes to exit. Aug 13 03:50:37.816658 systemd-logind[1192]: Removed session 18. Aug 13 03:50:40.099000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:40.109336 kernel: kauditd_printk_skb: 19 callbacks suppressed Aug 13 03:50:40.120971 kernel: audit: type=1400 audit(1755057040.099:1608): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:40.121823 kernel: audit: type=1400 audit(1755057040.099:1609): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:40.121898 kernel: audit: type=1300 audit(1755057040.099:1608): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a28c40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:50:40.099000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:40.099000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a28c40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:50:40.099000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:50:40.139962 kernel: audit: type=1327 audit(1755057040.099:1608): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:50:40.099000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b5cf40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:50:40.099000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:50:40.156868 kernel: audit: type=1300 audit(1755057040.099:1609): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b5cf40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:50:40.157067 kernel: audit: type=1327 audit(1755057040.099:1609): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:50:40.111000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:40.111000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a28e80 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:50:40.172080 kernel: audit: type=1400 audit(1755057040.111:1610): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:40.173074 kernel: audit: type=1300 audit(1755057040.111:1610): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a28e80 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:50:40.173151 kernel: audit: type=1327 audit(1755057040.111:1610): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:50:40.111000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:50:40.111000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:40.187239 kernel: audit: type=1400 audit(1755057040.111:1611): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:50:40.111000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a28ea0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:50:40.111000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:50:42.943577 systemd[1]: Started sshd@18-10.244.16.30:22-139.178.89.65:40876.service. Aug 13 03:50:42.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.16.30:22-139.178.89.65:40876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:43.906000 audit[5496]: USER_ACCT pid=5496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:43.909000 audit[5496]: CRED_ACQ pid=5496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:43.910000 audit[5496]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc65f65cc0 a2=3 a3=0 items=0 ppid=1 pid=5496 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:43.910000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:43.918817 sshd[5496]: Accepted publickey for core from 139.178.89.65 port 40876 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:50:43.914505 sshd[5496]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:50:43.928094 systemd-logind[1192]: New session 19 of user core. Aug 13 03:50:43.930125 systemd[1]: Started session-19.scope. Aug 13 03:50:43.942000 audit[5496]: USER_START pid=5496 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:43.944000 audit[5498]: CRED_ACQ pid=5498 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:45.502084 sshd[5496]: pam_unix(sshd:session): session closed for user core Aug 13 03:50:45.536031 kernel: kauditd_printk_skb: 10 callbacks suppressed Aug 13 03:50:45.537118 kernel: audit: type=1106 audit(1755057045.505:1618): pid=5496 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:45.537644 kernel: audit: type=1104 audit(1755057045.505:1619): pid=5496 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:45.538080 kernel: audit: type=1131 audit(1755057045.516:1620): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.16.30:22-139.178.89.65:40876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:45.505000 audit[5496]: USER_END pid=5496 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:45.505000 audit[5496]: CRED_DISP pid=5496 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:45.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.16.30:22-139.178.89.65:40876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:45.510885 systemd[1]: sshd@18-10.244.16.30:22-139.178.89.65:40876.service: Deactivated successfully. Aug 13 03:50:45.518581 systemd[1]: session-19.scope: Deactivated successfully. Aug 13 03:50:45.525709 systemd-logind[1192]: Session 19 logged out. Waiting for processes to exit. Aug 13 03:50:45.527766 systemd-logind[1192]: Removed session 19. Aug 13 03:50:45.631736 systemd[1]: run-containerd-runc-k8s.io-7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099-runc.V9dV1z.mount: Deactivated successfully. Aug 13 03:50:45.695773 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.AWAL8o.mount: Deactivated successfully. Aug 13 03:50:45.750000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:50:45.772207 kernel: audit: type=1400 audit(1755057045.750:1621): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:50:45.772344 kernel: audit: type=1300 audit(1755057045.750:1621): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001cd0d60 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:50:45.750000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001cd0d60 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:50:45.750000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:50:45.785969 kernel: audit: type=1327 audit(1755057045.750:1621): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:50:50.719230 kernel: audit: type=1130 audit(1755057050.709:1622): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.16.30:22-139.178.89.65:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:50.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.16.30:22-139.178.89.65:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:50.708849 systemd[1]: Started sshd@19-10.244.16.30:22-139.178.89.65:54392.service. Aug 13 03:50:50.901667 systemd[1]: run-containerd-runc-k8s.io-f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82-runc.g2RY8R.mount: Deactivated successfully. Aug 13 03:50:51.754000 audit[5547]: USER_ACCT pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:51.769741 kernel: audit: type=1101 audit(1755057051.754:1623): pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:51.770489 sshd[5547]: Accepted publickey for core from 139.178.89.65 port 54392 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:50:51.766000 audit[5547]: CRED_ACQ pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:51.771523 sshd[5547]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:50:51.791990 kernel: audit: type=1103 audit(1755057051.766:1624): pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:51.810212 kernel: audit: type=1006 audit(1755057051.766:1625): pid=5547 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Aug 13 03:50:51.766000 audit[5547]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed1f8b820 a2=3 a3=0 items=0 ppid=1 pid=5547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:51.826155 kernel: audit: type=1300 audit(1755057051.766:1625): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed1f8b820 a2=3 a3=0 items=0 ppid=1 pid=5547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:51.823376 systemd-logind[1192]: New session 20 of user core. Aug 13 03:50:51.831022 kernel: audit: type=1327 audit(1755057051.766:1625): proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:51.766000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:51.823619 systemd[1]: Started session-20.scope. Aug 13 03:50:51.839000 audit[5547]: USER_START pid=5547 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:51.849151 kernel: audit: type=1105 audit(1755057051.839:1626): pid=5547 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:51.850000 audit[5568]: CRED_ACQ pid=5568 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:51.861222 kernel: audit: type=1103 audit(1755057051.850:1627): pid=5568 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:52.746756 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.w7xteo.mount: Deactivated successfully. Aug 13 03:50:53.563153 sshd[5547]: pam_unix(sshd:session): session closed for user core Aug 13 03:50:53.587000 audit[5547]: USER_END pid=5547 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:53.606428 kernel: audit: type=1106 audit(1755057053.587:1628): pid=5547 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:53.592000 audit[5547]: CRED_DISP pid=5547 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:53.620580 systemd[1]: sshd@19-10.244.16.30:22-139.178.89.65:54392.service: Deactivated successfully. Aug 13 03:50:53.622712 kernel: audit: type=1104 audit(1755057053.592:1629): pid=5547 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:53.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.16.30:22-139.178.89.65:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:53.624478 systemd[1]: session-20.scope: Deactivated successfully. Aug 13 03:50:53.633016 systemd-logind[1192]: Session 20 logged out. Waiting for processes to exit. Aug 13 03:50:53.643400 systemd-logind[1192]: Removed session 20. Aug 13 03:50:55.317000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:50:55.317000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002953140 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:50:55.317000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:50:58.728026 systemd[1]: Started sshd@20-10.244.16.30:22-139.178.89.65:54406.service. Aug 13 03:50:58.759105 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:50:58.767379 kernel: audit: type=1130 audit(1755057058.729:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.16.30:22-139.178.89.65:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:58.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.16.30:22-139.178.89.65:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:50:59.736000 audit[5599]: USER_ACCT pid=5599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:59.744502 sshd[5599]: Accepted publickey for core from 139.178.89.65 port 54406 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:50:59.748992 kernel: audit: type=1101 audit(1755057059.736:1633): pid=5599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:59.756000 audit[5599]: CRED_ACQ pid=5599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:59.769633 kernel: audit: type=1103 audit(1755057059.756:1634): pid=5599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:59.769826 kernel: audit: type=1006 audit(1755057059.756:1635): pid=5599 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Aug 13 03:50:59.770246 kernel: audit: type=1300 audit(1755057059.756:1635): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc984e6b80 a2=3 a3=0 items=0 ppid=1 pid=5599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:59.756000 audit[5599]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc984e6b80 a2=3 a3=0 items=0 ppid=1 pid=5599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:50:59.769466 sshd[5599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:50:59.756000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:59.779983 kernel: audit: type=1327 audit(1755057059.756:1635): proctitle=737368643A20636F7265205B707269765D Aug 13 03:50:59.818896 systemd-logind[1192]: New session 21 of user core. Aug 13 03:50:59.822240 systemd[1]: Started session-21.scope. Aug 13 03:50:59.835000 audit[5599]: USER_START pid=5599 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:59.845091 kernel: audit: type=1105 audit(1755057059.835:1636): pid=5599 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:59.846000 audit[5601]: CRED_ACQ pid=5601 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:50:59.854975 kernel: audit: type=1103 audit(1755057059.846:1637): pid=5601 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:01.239200 sshd[5599]: pam_unix(sshd:session): session closed for user core Aug 13 03:51:01.242000 audit[5599]: USER_END pid=5599 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:01.254953 kernel: audit: type=1106 audit(1755057061.242:1638): pid=5599 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:01.255534 systemd[1]: sshd@20-10.244.16.30:22-139.178.89.65:54406.service: Deactivated successfully. Aug 13 03:51:01.260319 systemd[1]: session-21.scope: Deactivated successfully. Aug 13 03:51:01.246000 audit[5599]: CRED_DISP pid=5599 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:01.269435 systemd-logind[1192]: Session 21 logged out. Waiting for processes to exit. Aug 13 03:51:01.276889 kernel: audit: type=1104 audit(1755057061.246:1639): pid=5599 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:01.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.16.30:22-139.178.89.65:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:01.271583 systemd-logind[1192]: Removed session 21. Aug 13 03:51:06.401530 systemd[1]: Started sshd@21-10.244.16.30:22-139.178.89.65:46440.service. Aug 13 03:51:06.418777 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:51:06.421614 kernel: audit: type=1130 audit(1755057066.401:1641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.16.30:22-139.178.89.65:46440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:06.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.16.30:22-139.178.89.65:46440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:07.389000 audit[5617]: USER_ACCT pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:07.404694 kernel: audit: type=1101 audit(1755057067.389:1642): pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:07.405840 sshd[5617]: Accepted publickey for core from 139.178.89.65 port 46440 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:51:07.409000 audit[5617]: CRED_ACQ pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:07.418090 kernel: audit: type=1103 audit(1755057067.409:1643): pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:07.423421 kernel: audit: type=1006 audit(1755057067.409:1644): pid=5617 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Aug 13 03:51:07.425337 sshd[5617]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:51:07.409000 audit[5617]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8f73e900 a2=3 a3=0 items=0 ppid=1 pid=5617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:07.448196 kernel: audit: type=1300 audit(1755057067.409:1644): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8f73e900 a2=3 a3=0 items=0 ppid=1 pid=5617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:07.448295 kernel: audit: type=1327 audit(1755057067.409:1644): proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:07.409000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:07.448363 systemd[1]: Started session-22.scope. Aug 13 03:51:07.448715 systemd-logind[1192]: New session 22 of user core. Aug 13 03:51:07.472224 kernel: audit: type=1105 audit(1755057067.461:1645): pid=5617 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:07.461000 audit[5617]: USER_START pid=5617 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:07.479450 kernel: audit: type=1103 audit(1755057067.461:1646): pid=5619 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:07.461000 audit[5619]: CRED_ACQ pid=5619 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:08.918787 sshd[5617]: pam_unix(sshd:session): session closed for user core Aug 13 03:51:08.924000 audit[5617]: USER_END pid=5617 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:08.939126 kernel: audit: type=1106 audit(1755057068.924:1647): pid=5617 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:08.936717 systemd[1]: sshd@21-10.244.16.30:22-139.178.89.65:46440.service: Deactivated successfully. Aug 13 03:51:08.938286 systemd[1]: session-22.scope: Deactivated successfully. Aug 13 03:51:08.940890 systemd-logind[1192]: Session 22 logged out. Waiting for processes to exit. Aug 13 03:51:08.952142 kernel: audit: type=1104 audit(1755057068.924:1648): pid=5617 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:08.924000 audit[5617]: CRED_DISP pid=5617 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:08.944189 systemd-logind[1192]: Removed session 22. Aug 13 03:51:08.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.16.30:22-139.178.89.65:46440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:14.112477 systemd[1]: Started sshd@22-10.244.16.30:22-139.178.89.65:40092.service. Aug 13 03:51:14.133071 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:51:14.134984 kernel: audit: type=1130 audit(1755057074.111:1650): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.16.30:22-139.178.89.65:40092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:14.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.16.30:22-139.178.89.65:40092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:15.268000 audit[5630]: USER_ACCT pid=5630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:15.284092 kernel: audit: type=1101 audit(1755057075.268:1651): pid=5630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:15.284259 kernel: audit: type=1103 audit(1755057075.282:1652): pid=5630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:15.282000 audit[5630]: CRED_ACQ pid=5630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:15.287261 sshd[5630]: Accepted publickey for core from 139.178.89.65 port 40092 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:51:15.294550 kernel: audit: type=1006 audit(1755057075.282:1653): pid=5630 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Aug 13 03:51:15.295329 sshd[5630]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:51:15.282000 audit[5630]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd829bf4c0 a2=3 a3=0 items=0 ppid=1 pid=5630 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:15.313390 kernel: audit: type=1300 audit(1755057075.282:1653): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd829bf4c0 a2=3 a3=0 items=0 ppid=1 pid=5630 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:15.282000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:15.323246 kernel: audit: type=1327 audit(1755057075.282:1653): proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:15.330057 systemd-logind[1192]: New session 23 of user core. Aug 13 03:51:15.333887 systemd[1]: Started session-23.scope. Aug 13 03:51:15.348000 audit[5630]: USER_START pid=5630 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:15.357004 kernel: audit: type=1105 audit(1755057075.348:1654): pid=5630 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:15.348000 audit[5632]: CRED_ACQ pid=5632 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:15.375961 kernel: audit: type=1103 audit(1755057075.348:1655): pid=5632 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:15.691436 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.JNkd38.mount: Deactivated successfully. Aug 13 03:51:16.856212 sshd[5630]: pam_unix(sshd:session): session closed for user core Aug 13 03:51:16.874000 audit[5630]: USER_END pid=5630 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:16.882966 kernel: audit: type=1106 audit(1755057076.874:1656): pid=5630 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:16.884301 kernel: audit: type=1104 audit(1755057076.876:1657): pid=5630 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:16.876000 audit[5630]: CRED_DISP pid=5630 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:16.895698 systemd[1]: sshd@22-10.244.16.30:22-139.178.89.65:40092.service: Deactivated successfully. Aug 13 03:51:16.900723 systemd[1]: session-23.scope: Deactivated successfully. Aug 13 03:51:16.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.16.30:22-139.178.89.65:40092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:16.905179 systemd-logind[1192]: Session 23 logged out. Waiting for processes to exit. Aug 13 03:51:16.916266 systemd-logind[1192]: Removed session 23. Aug 13 03:51:22.015676 systemd[1]: Started sshd@23-10.244.16.30:22-139.178.89.65:54338.service. Aug 13 03:51:22.072210 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:51:22.076106 kernel: audit: type=1130 audit(1755057082.016:1659): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.16.30:22-139.178.89.65:54338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:22.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.16.30:22-139.178.89.65:54338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:23.033000 audit[5711]: USER_ACCT pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:23.039185 sshd[5711]: Accepted publickey for core from 139.178.89.65 port 54338 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:51:23.043964 kernel: audit: type=1101 audit(1755057083.033:1660): pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:23.045000 audit[5711]: CRED_ACQ pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:23.050565 sshd[5711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:51:23.054714 kernel: audit: type=1103 audit(1755057083.045:1661): pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:23.059711 kernel: audit: type=1006 audit(1755057083.045:1662): pid=5711 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Aug 13 03:51:23.059796 kernel: audit: type=1300 audit(1755057083.045:1662): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad1491b0 a2=3 a3=0 items=0 ppid=1 pid=5711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:23.045000 audit[5711]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad1491b0 a2=3 a3=0 items=0 ppid=1 pid=5711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:23.045000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:23.068954 kernel: audit: type=1327 audit(1755057083.045:1662): proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:23.109800 systemd-logind[1192]: New session 24 of user core. Aug 13 03:51:23.113828 systemd[1]: Started session-24.scope. Aug 13 03:51:23.122000 audit[5711]: USER_START pid=5711 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:23.125000 audit[5713]: CRED_ACQ pid=5713 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:23.151474 kernel: audit: type=1105 audit(1755057083.122:1663): pid=5711 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:23.151697 kernel: audit: type=1103 audit(1755057083.125:1664): pid=5713 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:24.502429 sshd[5711]: pam_unix(sshd:session): session closed for user core Aug 13 03:51:24.520976 kernel: audit: type=1106 audit(1755057084.505:1665): pid=5711 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:24.521126 kernel: audit: type=1104 audit(1755057084.507:1666): pid=5711 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:24.505000 audit[5711]: USER_END pid=5711 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:24.507000 audit[5711]: CRED_DISP pid=5711 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:24.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.16.30:22-139.178.89.65:54338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:24.516168 systemd[1]: sshd@23-10.244.16.30:22-139.178.89.65:54338.service: Deactivated successfully. Aug 13 03:51:24.522510 systemd[1]: session-24.scope: Deactivated successfully. Aug 13 03:51:24.525169 systemd-logind[1192]: Session 24 logged out. Waiting for processes to exit. Aug 13 03:51:24.526629 systemd-logind[1192]: Removed session 24. Aug 13 03:51:29.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.16.30:22-139.178.89.65:58922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:29.671541 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:51:29.673451 kernel: audit: type=1130 audit(1755057089.664:1668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.16.30:22-139.178.89.65:58922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:29.665078 systemd[1]: Started sshd@24-10.244.16.30:22-139.178.89.65:58922.service. Aug 13 03:51:30.677000 audit[5729]: USER_ACCT pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:30.681492 sshd[5729]: Accepted publickey for core from 139.178.89.65 port 58922 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:51:30.685983 kernel: audit: type=1101 audit(1755057090.677:1669): pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:30.686000 audit[5729]: CRED_ACQ pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:30.691557 sshd[5729]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:51:30.694955 kernel: audit: type=1103 audit(1755057090.686:1670): pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:30.703987 kernel: audit: type=1006 audit(1755057090.686:1671): pid=5729 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Aug 13 03:51:30.686000 audit[5729]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc559d5620 a2=3 a3=0 items=0 ppid=1 pid=5729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:30.722517 kernel: audit: type=1300 audit(1755057090.686:1671): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc559d5620 a2=3 a3=0 items=0 ppid=1 pid=5729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:30.722719 kernel: audit: type=1327 audit(1755057090.686:1671): proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:30.686000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:30.725881 systemd[1]: Started session-25.scope. Aug 13 03:51:30.726408 systemd-logind[1192]: New session 25 of user core. Aug 13 03:51:30.740000 audit[5729]: USER_START pid=5729 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:30.749026 kernel: audit: type=1105 audit(1755057090.740:1672): pid=5729 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:30.751000 audit[5731]: CRED_ACQ pid=5731 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:30.758958 kernel: audit: type=1103 audit(1755057090.751:1673): pid=5731 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:31.593000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:31.604953 kernel: audit: type=1400 audit(1755057091.593:1674): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:31.593000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e99f80 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:51:31.614990 kernel: audit: type=1300 audit(1755057091.593:1674): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e99f80 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:51:31.593000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:51:31.597000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:31.597000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003118ee0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:51:31.597000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:51:32.267815 sshd[5729]: pam_unix(sshd:session): session closed for user core Aug 13 03:51:32.271000 audit[5729]: USER_END pid=5729 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:32.271000 audit[5729]: CRED_DISP pid=5729 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:32.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.16.30:22-139.178.89.65:58922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:32.274893 systemd[1]: sshd@24-10.244.16.30:22-139.178.89.65:58922.service: Deactivated successfully. Aug 13 03:51:32.277457 systemd[1]: session-25.scope: Deactivated successfully. Aug 13 03:51:32.281899 systemd-logind[1192]: Session 25 logged out. Waiting for processes to exit. Aug 13 03:51:32.284447 systemd-logind[1192]: Removed session 25. Aug 13 03:51:33.374000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:33.374000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:33.374000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00f7476b0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:51:33.374000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:51:33.374000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011ab3b00 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:51:33.374000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:51:33.378000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:33.378000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0104f0ec0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:51:33.378000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:51:33.381000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:33.381000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011ab3c50 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:51:33.381000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:51:33.470000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:33.470000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0068b6420 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:51:33.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:51:33.470000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:33.470000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006543650 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:51:33.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:51:37.437995 systemd[1]: Started sshd@25-10.244.16.30:22-139.178.89.65:58930.service. Aug 13 03:51:37.459194 kernel: kauditd_printk_skb: 25 callbacks suppressed Aug 13 03:51:37.460637 kernel: audit: type=1130 audit(1755057097.437:1685): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.16.30:22-139.178.89.65:58930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:37.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.16.30:22-139.178.89.65:58930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:38.426000 audit[5743]: USER_ACCT pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:38.443078 kernel: audit: type=1101 audit(1755057098.426:1686): pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:38.443689 kernel: audit: type=1103 audit(1755057098.438:1687): pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:38.438000 audit[5743]: CRED_ACQ pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:38.442271 sshd[5743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:51:38.456577 kernel: audit: type=1006 audit(1755057098.438:1688): pid=5743 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Aug 13 03:51:38.456723 sshd[5743]: Accepted publickey for core from 139.178.89.65 port 58930 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:51:38.465585 kernel: audit: type=1300 audit(1755057098.438:1688): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9ea5ddf0 a2=3 a3=0 items=0 ppid=1 pid=5743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:38.438000 audit[5743]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9ea5ddf0 a2=3 a3=0 items=0 ppid=1 pid=5743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:38.500427 kernel: audit: type=1327 audit(1755057098.438:1688): proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:38.438000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:38.479214 systemd[1]: Started session-26.scope. Aug 13 03:51:38.510414 kernel: audit: type=1105 audit(1755057098.500:1689): pid=5743 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:38.500000 audit[5743]: USER_START pid=5743 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:38.481099 systemd-logind[1192]: New session 26 of user core. Aug 13 03:51:38.522050 kernel: audit: type=1103 audit(1755057098.509:1690): pid=5748 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:38.509000 audit[5748]: CRED_ACQ pid=5748 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:40.055429 sshd[5743]: pam_unix(sshd:session): session closed for user core Aug 13 03:51:40.094470 kernel: audit: type=1106 audit(1755057100.058:1691): pid=5743 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:40.095312 kernel: audit: type=1104 audit(1755057100.058:1692): pid=5743 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:40.058000 audit[5743]: USER_END pid=5743 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:40.058000 audit[5743]: CRED_DISP pid=5743 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:40.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.16.30:22-139.178.89.65:58930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:40.081600 systemd[1]: sshd@25-10.244.16.30:22-139.178.89.65:58930.service: Deactivated successfully. Aug 13 03:51:40.084492 systemd[1]: session-26.scope: Deactivated successfully. Aug 13 03:51:40.089114 systemd-logind[1192]: Session 26 logged out. Waiting for processes to exit. Aug 13 03:51:40.091874 systemd-logind[1192]: Removed session 26. Aug 13 03:51:40.123000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:40.123000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:40.123000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003119c20 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:51:40.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:51:40.123000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030d8ba0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:51:40.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:51:40.133000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:40.133000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003119c40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:51:40.133000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:51:40.133000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:51:40.133000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003119c60 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:51:40.133000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:51:45.375646 systemd[1]: Started sshd@26-10.244.16.30:22-139.178.89.65:52200.service. Aug 13 03:51:45.421435 kernel: kauditd_printk_skb: 13 callbacks suppressed Aug 13 03:51:45.441363 kernel: audit: type=1130 audit(1755057105.378:1698): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.16.30:22-139.178.89.65:52200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:45.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.16.30:22-139.178.89.65:52200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:45.729802 systemd[1]: run-containerd-runc-k8s.io-7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099-runc.rVGc9l.mount: Deactivated successfully. Aug 13 03:51:45.834000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:51:45.845553 kernel: audit: type=1400 audit(1755057105.834:1699): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:51:45.846335 kernel: audit: type=1300 audit(1755057105.834:1699): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001128d80 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:51:45.834000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001128d80 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:51:45.864578 kernel: audit: type=1327 audit(1755057105.834:1699): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:51:45.834000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:51:46.567000 audit[5781]: USER_ACCT pid=5781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:46.578219 sshd[5781]: Accepted publickey for core from 139.178.89.65 port 52200 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:51:46.585170 kernel: audit: type=1101 audit(1755057106.567:1700): pid=5781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:46.585295 kernel: audit: type=1103 audit(1755057106.578:1701): pid=5781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:46.578000 audit[5781]: CRED_ACQ pid=5781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:46.589503 sshd[5781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:51:46.598959 kernel: audit: type=1006 audit(1755057106.578:1702): pid=5781 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Aug 13 03:51:46.578000 audit[5781]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb74d4670 a2=3 a3=0 items=0 ppid=1 pid=5781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:46.612954 kernel: audit: type=1300 audit(1755057106.578:1702): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb74d4670 a2=3 a3=0 items=0 ppid=1 pid=5781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:46.578000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:46.616059 kernel: audit: type=1327 audit(1755057106.578:1702): proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:46.647811 systemd-logind[1192]: New session 27 of user core. Aug 13 03:51:46.653769 systemd[1]: Started session-27.scope. Aug 13 03:51:46.672000 audit[5781]: USER_START pid=5781 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:46.683949 kernel: audit: type=1105 audit(1755057106.672:1703): pid=5781 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:46.684000 audit[5831]: CRED_ACQ pid=5831 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:48.401175 sshd[5781]: pam_unix(sshd:session): session closed for user core Aug 13 03:51:48.418000 audit[5781]: USER_END pid=5781 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:48.420000 audit[5781]: CRED_DISP pid=5781 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:48.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.16.30:22-139.178.89.65:52200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:48.432219 systemd-logind[1192]: Session 27 logged out. Waiting for processes to exit. Aug 13 03:51:48.437719 systemd[1]: sshd@26-10.244.16.30:22-139.178.89.65:52200.service: Deactivated successfully. Aug 13 03:51:48.444184 systemd[1]: session-27.scope: Deactivated successfully. Aug 13 03:51:48.447464 systemd-logind[1192]: Removed session 27. Aug 13 03:51:53.574335 systemd[1]: Started sshd@27-10.244.16.30:22-139.178.89.65:45940.service. Aug 13 03:51:53.625362 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:51:53.632669 kernel: audit: type=1130 audit(1755057113.577:1708): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.244.16.30:22-139.178.89.65:45940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:53.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.244.16.30:22-139.178.89.65:45940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:54.598000 audit[5894]: USER_ACCT pid=5894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:54.606456 sshd[5894]: Accepted publickey for core from 139.178.89.65 port 45940 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:51:54.614437 kernel: audit: type=1101 audit(1755057114.598:1709): pid=5894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:54.618000 audit[5894]: CRED_ACQ pid=5894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:54.633028 kernel: audit: type=1103 audit(1755057114.618:1710): pid=5894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:54.633191 kernel: audit: type=1006 audit(1755057114.618:1711): pid=5894 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Aug 13 03:51:54.633500 sshd[5894]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:51:54.635515 kernel: audit: type=1300 audit(1755057114.618:1711): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde8ad130 a2=3 a3=0 items=0 ppid=1 pid=5894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:54.618000 audit[5894]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde8ad130 a2=3 a3=0 items=0 ppid=1 pid=5894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:51:54.645984 kernel: audit: type=1327 audit(1755057114.618:1711): proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:54.618000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:51:54.698892 systemd-logind[1192]: New session 28 of user core. Aug 13 03:51:54.702721 systemd[1]: Started session-28.scope. Aug 13 03:51:54.727000 audit[5894]: USER_START pid=5894 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:54.737576 kernel: audit: type=1105 audit(1755057114.727:1712): pid=5894 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:54.737000 audit[5896]: CRED_ACQ pid=5896 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:54.745454 kernel: audit: type=1103 audit(1755057114.737:1713): pid=5896 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:55.345000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:51:55.357979 kernel: audit: type=1400 audit(1755057115.345:1714): avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:51:55.345000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0029524c0 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:51:55.381727 kernel: audit: type=1300 audit(1755057115.345:1714): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0029524c0 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:51:55.345000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:51:56.660518 sshd[5894]: pam_unix(sshd:session): session closed for user core Aug 13 03:51:56.679000 audit[5894]: USER_END pid=5894 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:56.681000 audit[5894]: CRED_DISP pid=5894 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:51:56.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.244.16.30:22-139.178.89.65:45940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:51:56.708701 systemd[1]: sshd@27-10.244.16.30:22-139.178.89.65:45940.service: Deactivated successfully. Aug 13 03:51:56.714879 systemd[1]: session-28.scope: Deactivated successfully. Aug 13 03:51:56.717062 systemd-logind[1192]: Session 28 logged out. Waiting for processes to exit. Aug 13 03:51:56.721516 systemd-logind[1192]: Removed session 28. Aug 13 03:52:01.889163 systemd[1]: Started sshd@28-10.244.16.30:22-139.178.89.65:43374.service. Aug 13 03:52:01.909629 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:52:01.917233 kernel: audit: type=1130 audit(1755057121.889:1718): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.244.16.30:22-139.178.89.65:43374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:01.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.244.16.30:22-139.178.89.65:43374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:01.957074 kernel: audit: type=1130 audit(1755057121.935:1719): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.244.16.30:22-80.94.93.119:15454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:01.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.244.16.30:22-80.94.93.119:15454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:01.936131 systemd[1]: Started sshd@29-10.244.16.30:22-80.94.93.119:15454.service. Aug 13 03:52:02.343256 sshd[5910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.119 user=root Aug 13 03:52:02.360140 kernel: audit: type=1100 audit(1755057122.342:1720): pid=5910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:02.342000 audit[5910]: USER_AUTH pid=5910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:02.921697 sshd[5908]: Accepted publickey for core from 139.178.89.65 port 43374 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:52:02.920000 audit[5908]: USER_ACCT pid=5908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:02.933263 kernel: audit: type=1101 audit(1755057122.920:1721): pid=5908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:02.933000 audit[5908]: CRED_ACQ pid=5908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:02.942819 kernel: audit: type=1103 audit(1755057122.933:1722): pid=5908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:02.954106 kernel: audit: type=1006 audit(1755057122.933:1723): pid=5908 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Aug 13 03:52:02.954284 kernel: audit: type=1300 audit(1755057122.933:1723): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1e1a6b90 a2=3 a3=0 items=0 ppid=1 pid=5908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:02.933000 audit[5908]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1e1a6b90 a2=3 a3=0 items=0 ppid=1 pid=5908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:02.965941 kernel: audit: type=1327 audit(1755057122.933:1723): proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:02.933000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:02.954974 sshd[5908]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:52:02.977732 systemd-logind[1192]: New session 29 of user core. Aug 13 03:52:02.978106 systemd[1]: Started session-29.scope. Aug 13 03:52:03.000351 kernel: audit: type=1105 audit(1755057122.988:1724): pid=5908 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:02.988000 audit[5908]: USER_START pid=5908 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:02.998000 audit[5913]: CRED_ACQ pid=5913 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:03.007977 kernel: audit: type=1103 audit(1755057122.998:1725): pid=5913 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:04.500564 sshd[5908]: pam_unix(sshd:session): session closed for user core Aug 13 03:52:04.503000 audit[5908]: USER_END pid=5908 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:04.503000 audit[5908]: CRED_DISP pid=5908 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:04.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.244.16.30:22-139.178.89.65:43374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:04.507540 systemd-logind[1192]: Session 29 logged out. Waiting for processes to exit. Aug 13 03:52:04.509526 systemd[1]: sshd@28-10.244.16.30:22-139.178.89.65:43374.service: Deactivated successfully. Aug 13 03:52:04.510745 systemd[1]: session-29.scope: Deactivated successfully. Aug 13 03:52:04.512707 systemd-logind[1192]: Removed session 29. Aug 13 03:52:04.606198 sshd[5910]: Failed password for root from 80.94.93.119 port 15454 ssh2 Aug 13 03:52:05.015000 audit[5910]: USER_AUTH pid=5910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:07.030058 sshd[5910]: Failed password for root from 80.94.93.119 port 15454 ssh2 Aug 13 03:52:07.703065 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:52:07.711080 kernel: audit: type=1100 audit(1755057127.694:1730): pid=5910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:07.694000 audit[5910]: USER_AUTH pid=5910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:09.311404 sshd[5910]: Failed password for root from 80.94.93.119 port 15454 ssh2 Aug 13 03:52:09.660669 systemd[1]: Started sshd@30-10.244.16.30:22-139.178.89.65:38538.service. Aug 13 03:52:09.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.244.16.30:22-139.178.89.65:38538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:09.672147 kernel: audit: type=1130 audit(1755057129.660:1731): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.244.16.30:22-139.178.89.65:38538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:10.365518 sshd[5910]: Received disconnect from 80.94.93.119 port 15454:11: [preauth] Aug 13 03:52:10.365518 sshd[5910]: Disconnected from authenticating user root 80.94.93.119 port 15454 [preauth] Aug 13 03:52:10.366407 sshd[5910]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.119 user=root Aug 13 03:52:10.367788 systemd[1]: sshd@29-10.244.16.30:22-80.94.93.119:15454.service: Deactivated successfully. Aug 13 03:52:10.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.244.16.30:22-80.94.93.119:15454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:10.379964 kernel: audit: type=1131 audit(1755057130.367:1732): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.244.16.30:22-80.94.93.119:15454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:10.417264 systemd[1]: Started sshd@31-10.244.16.30:22-80.94.93.119:29800.service. Aug 13 03:52:10.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.244.16.30:22-80.94.93.119:29800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:10.424958 kernel: audit: type=1130 audit(1755057130.416:1733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.244.16.30:22-80.94.93.119:29800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:10.660000 audit[5924]: USER_ACCT pid=5924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:10.662965 sshd[5924]: Accepted publickey for core from 139.178.89.65 port 38538 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:52:10.668962 kernel: audit: type=1101 audit(1755057130.660:1734): pid=5924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:10.670000 audit[5924]: CRED_ACQ pid=5924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:10.678969 kernel: audit: type=1103 audit(1755057130.670:1735): pid=5924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:10.679972 sshd[5924]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:52:10.686995 kernel: audit: type=1006 audit(1755057130.670:1736): pid=5924 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Aug 13 03:52:10.670000 audit[5924]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1fb4e00 a2=3 a3=0 items=0 ppid=1 pid=5924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:10.695958 kernel: audit: type=1300 audit(1755057130.670:1736): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1fb4e00 a2=3 a3=0 items=0 ppid=1 pid=5924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:10.670000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:10.722008 kernel: audit: type=1327 audit(1755057130.670:1736): proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:10.732586 systemd-logind[1192]: New session 30 of user core. Aug 13 03:52:10.733874 systemd[1]: Started session-30.scope. Aug 13 03:52:10.746000 audit[5924]: USER_START pid=5924 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:10.755961 kernel: audit: type=1105 audit(1755057130.746:1737): pid=5924 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:10.755000 audit[5930]: CRED_ACQ pid=5930 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:10.786015 sshd[5928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.119 user=root Aug 13 03:52:10.785000 audit[5928]: USER_AUTH pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:12.126767 sshd[5924]: pam_unix(sshd:session): session closed for user core Aug 13 03:52:12.136000 audit[5924]: USER_END pid=5924 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:12.136000 audit[5924]: CRED_DISP pid=5924 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:12.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.244.16.30:22-139.178.89.65:38538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:12.140070 systemd[1]: sshd@30-10.244.16.30:22-139.178.89.65:38538.service: Deactivated successfully. Aug 13 03:52:12.141294 systemd[1]: session-30.scope: Deactivated successfully. Aug 13 03:52:12.146048 systemd-logind[1192]: Session 30 logged out. Waiting for processes to exit. Aug 13 03:52:12.148094 systemd-logind[1192]: Removed session 30. Aug 13 03:52:13.150076 sshd[5928]: Failed password for root from 80.94.93.119 port 29800 ssh2 Aug 13 03:52:13.466000 audit[5928]: ANOM_LOGIN_FAILURES pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:13.472496 kernel: kauditd_printk_skb: 5 callbacks suppressed Aug 13 03:52:13.472775 kernel: audit: type=2100 audit(1755057133.466:1743): pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:13.478455 sshd[5928]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Aug 13 03:52:13.478000 audit[5928]: USER_AUTH pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:13.487963 kernel: audit: type=1100 audit(1755057133.478:1744): pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:15.587561 sshd[5928]: Failed password for root from 80.94.93.119 port 29800 ssh2 Aug 13 03:52:16.139000 audit[5928]: USER_AUTH pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:16.152038 kernel: audit: type=1100 audit(1755057136.139:1745): pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:17.280632 systemd[1]: Started sshd@32-10.244.16.30:22-139.178.89.65:38548.service. Aug 13 03:52:17.310604 kernel: audit: type=1130 audit(1755057137.280:1746): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.244.16.30:22-139.178.89.65:38548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:17.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.244.16.30:22-139.178.89.65:38548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:18.268000 audit[5981]: USER_ACCT pid=5981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:18.293421 kernel: audit: type=1101 audit(1755057138.268:1747): pid=5981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:18.293782 kernel: audit: type=1103 audit(1755057138.278:1748): pid=5981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:18.301892 kernel: audit: type=1006 audit(1755057138.278:1749): pid=5981 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Aug 13 03:52:18.302014 kernel: audit: type=1300 audit(1755057138.278:1749): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9de15580 a2=3 a3=0 items=0 ppid=1 pid=5981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:18.278000 audit[5981]: CRED_ACQ pid=5981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:18.278000 audit[5981]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9de15580 a2=3 a3=0 items=0 ppid=1 pid=5981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:18.319115 kernel: audit: type=1327 audit(1755057138.278:1749): proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:18.278000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:18.319869 sshd[5981]: Accepted publickey for core from 139.178.89.65 port 38548 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:52:18.282418 sshd[5981]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:52:18.310226 systemd-logind[1192]: New session 31 of user core. Aug 13 03:52:18.312100 systemd[1]: Started session-31.scope. Aug 13 03:52:18.323000 audit[5981]: USER_START pid=5981 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:18.334382 kernel: audit: type=1105 audit(1755057138.323:1750): pid=5981 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:18.334000 audit[5983]: CRED_ACQ pid=5983 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:18.659786 sshd[5928]: Failed password for root from 80.94.93.119 port 29800 ssh2 Aug 13 03:52:18.817493 sshd[5928]: Received disconnect from 80.94.93.119 port 29800:11: [preauth] Aug 13 03:52:18.817493 sshd[5928]: Disconnected from authenticating user root 80.94.93.119 port 29800 [preauth] Aug 13 03:52:18.816581 sshd[5928]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.119 user=root Aug 13 03:52:18.833662 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:52:18.835484 kernel: audit: type=1131 audit(1755057138.824:1752): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.244.16.30:22-80.94.93.119:29800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:18.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.244.16.30:22-80.94.93.119:29800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:18.824750 systemd[1]: sshd@31-10.244.16.30:22-80.94.93.119:29800.service: Deactivated successfully. Aug 13 03:52:18.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.244.16.30:22-80.94.93.119:48656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:18.862091 systemd[1]: Started sshd@33-10.244.16.30:22-80.94.93.119:48656.service. Aug 13 03:52:18.869036 kernel: audit: type=1130 audit(1755057138.861:1753): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.244.16.30:22-80.94.93.119:48656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:19.276162 sshd[5990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.119 user=root Aug 13 03:52:19.275000 audit[5990]: USER_AUTH pid=5990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:19.286077 kernel: audit: type=1100 audit(1755057139.275:1754): pid=5990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:20.301351 sshd[5981]: pam_unix(sshd:session): session closed for user core Aug 13 03:52:20.334266 kernel: audit: type=1106 audit(1755057140.304:1755): pid=5981 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:20.335564 kernel: audit: type=1104 audit(1755057140.304:1756): pid=5981 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:20.337820 kernel: audit: type=1131 audit(1755057140.315:1757): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.244.16.30:22-139.178.89.65:38548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:20.304000 audit[5981]: USER_END pid=5981 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:20.304000 audit[5981]: CRED_DISP pid=5981 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:20.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.244.16.30:22-139.178.89.65:38548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:20.317559 systemd[1]: sshd@32-10.244.16.30:22-139.178.89.65:38548.service: Deactivated successfully. Aug 13 03:52:20.320243 systemd[1]: session-31.scope: Deactivated successfully. Aug 13 03:52:20.322403 systemd-logind[1192]: Session 31 logged out. Waiting for processes to exit. Aug 13 03:52:20.329535 systemd-logind[1192]: Removed session 31. Aug 13 03:52:20.872235 sshd[5990]: Failed password for root from 80.94.93.119 port 48656 ssh2 Aug 13 03:52:21.949000 audit[5990]: USER_AUTH pid=5990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:21.959958 kernel: audit: type=1100 audit(1755057141.949:1758): pid=5990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:24.492656 sshd[5990]: Failed password for root from 80.94.93.119 port 48656 ssh2 Aug 13 03:52:24.621000 audit[5990]: USER_AUTH pid=5990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:24.633958 kernel: audit: type=1100 audit(1755057144.621:1759): pid=5990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.93.119 addr=80.94.93.119 terminal=ssh res=failed' Aug 13 03:52:25.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.244.16.30:22-139.178.89.65:33730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:25.465276 systemd[1]: Started sshd@34-10.244.16.30:22-139.178.89.65:33730.service. Aug 13 03:52:25.481039 kernel: audit: type=1130 audit(1755057145.464:1760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.244.16.30:22-139.178.89.65:33730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:26.239140 sshd[5990]: Failed password for root from 80.94.93.119 port 48656 ssh2 Aug 13 03:52:26.480000 audit[6018]: USER_ACCT pid=6018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:26.496109 kernel: audit: type=1101 audit(1755057146.480:1761): pid=6018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:26.496271 kernel: audit: type=1103 audit(1755057146.491:1762): pid=6018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:26.491000 audit[6018]: CRED_ACQ pid=6018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:26.508105 kernel: audit: type=1006 audit(1755057146.492:1763): pid=6018 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Aug 13 03:52:26.508273 kernel: audit: type=1300 audit(1755057146.492:1763): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffba1a1dc0 a2=3 a3=0 items=0 ppid=1 pid=6018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:26.492000 audit[6018]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffba1a1dc0 a2=3 a3=0 items=0 ppid=1 pid=6018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:26.537398 kernel: audit: type=1327 audit(1755057146.492:1763): proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:26.492000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:26.537719 sshd[6018]: Accepted publickey for core from 139.178.89.65 port 33730 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:52:26.498814 sshd[6018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:52:26.542040 systemd[1]: Started session-32.scope. Aug 13 03:52:26.543021 systemd-logind[1192]: New session 32 of user core. Aug 13 03:52:26.578844 kernel: audit: type=1105 audit(1755057146.565:1764): pid=6018 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:26.587062 kernel: audit: type=1103 audit(1755057146.576:1765): pid=6020 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:26.565000 audit[6018]: USER_START pid=6018 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:26.576000 audit[6020]: CRED_ACQ pid=6020 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:27.301481 sshd[5990]: Received disconnect from 80.94.93.119 port 48656:11: [preauth] Aug 13 03:52:27.301481 sshd[5990]: Disconnected from authenticating user root 80.94.93.119 port 48656 [preauth] Aug 13 03:52:27.301532 sshd[5990]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.119 user=root Aug 13 03:52:27.302990 systemd[1]: sshd@33-10.244.16.30:22-80.94.93.119:48656.service: Deactivated successfully. Aug 13 03:52:27.316191 kernel: audit: type=1131 audit(1755057147.301:1766): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.244.16.30:22-80.94.93.119:48656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:27.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.244.16.30:22-80.94.93.119:48656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:27.970331 sshd[6018]: pam_unix(sshd:session): session closed for user core Aug 13 03:52:27.975000 audit[6018]: USER_END pid=6018 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:27.975000 audit[6018]: CRED_DISP pid=6018 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:27.981661 systemd[1]: sshd@34-10.244.16.30:22-139.178.89.65:33730.service: Deactivated successfully. Aug 13 03:52:27.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.244.16.30:22-139.178.89.65:33730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:27.983199 systemd[1]: session-32.scope: Deactivated successfully. Aug 13 03:52:27.984477 systemd-logind[1192]: Session 32 logged out. Waiting for processes to exit. Aug 13 03:52:27.986978 systemd-logind[1192]: Removed session 32. Aug 13 03:52:31.621021 kernel: kauditd_printk_skb: 3 callbacks suppressed Aug 13 03:52:31.623594 kernel: audit: type=1400 audit(1755057151.615:1770): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:31.615000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:31.615000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ef28d0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:31.649910 kernel: audit: type=1300 audit(1755057151.615:1770): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ef28d0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:31.650766 kernel: audit: type=1327 audit(1755057151.615:1770): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:31.615000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:31.657644 kernel: audit: type=1400 audit(1755057151.618:1771): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:31.618000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:31.618000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028de4a0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:31.671683 kernel: audit: type=1300 audit(1755057151.618:1771): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028de4a0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:31.671876 kernel: audit: type=1327 audit(1755057151.618:1771): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:31.618000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:33.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-10.244.16.30:22-139.178.89.65:44210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:33.107748 systemd[1]: Started sshd@35-10.244.16.30:22-139.178.89.65:44210.service. Aug 13 03:52:33.117266 kernel: audit: type=1130 audit(1755057153.107:1772): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-10.244.16.30:22-139.178.89.65:44210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:33.380000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:33.388951 kernel: audit: type=1400 audit(1755057153.380:1773): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:33.389311 kernel: audit: type=1400 audit(1755057153.381:1774): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:33.381000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:33.381000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c010593800 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:52:33.381000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:52:33.380000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0105937d0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:52:33.405245 kernel: audit: type=1300 audit(1755057153.381:1774): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c010593800 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:52:33.380000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:52:33.384000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:33.384000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c01123fe90 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:52:33.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:52:33.386000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:33.386000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c005ad7660 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:52:33.386000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:52:33.471000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:33.471000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0116535c0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:52:33.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:52:33.473000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:33.473000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c01268eae0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:52:33.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:52:34.097284 sshd[6033]: Accepted publickey for core from 139.178.89.65 port 44210 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:52:34.096000 audit[6033]: USER_ACCT pid=6033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:34.109000 audit[6033]: CRED_ACQ pid=6033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:34.110000 audit[6033]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe32a10fa0 a2=3 a3=0 items=0 ppid=1 pid=6033 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:34.110000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:34.113750 sshd[6033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:52:34.147601 systemd-logind[1192]: New session 33 of user core. Aug 13 03:52:34.150097 systemd[1]: Started session-33.scope. Aug 13 03:52:34.158000 audit[6033]: USER_START pid=6033 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:34.161000 audit[6035]: CRED_ACQ pid=6035 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:35.546670 sshd[6033]: pam_unix(sshd:session): session closed for user core Aug 13 03:52:35.549000 audit[6033]: USER_END pid=6033 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:35.549000 audit[6033]: CRED_DISP pid=6033 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:35.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-10.244.16.30:22-139.178.89.65:44210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:35.554109 systemd[1]: sshd@35-10.244.16.30:22-139.178.89.65:44210.service: Deactivated successfully. Aug 13 03:52:35.556508 systemd[1]: session-33.scope: Deactivated successfully. Aug 13 03:52:35.558062 systemd-logind[1192]: Session 33 logged out. Waiting for processes to exit. Aug 13 03:52:35.561263 systemd-logind[1192]: Removed session 33. Aug 13 03:52:40.139000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:40.181202 kernel: kauditd_printk_skb: 25 callbacks suppressed Aug 13 03:52:40.184354 kernel: audit: type=1400 audit(1755057160.139:1787): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:40.185535 kernel: audit: type=1300 audit(1755057160.139:1787): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00177f840 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:40.185666 kernel: audit: type=1327 audit(1755057160.139:1787): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:40.186242 kernel: audit: type=1400 audit(1755057160.139:1788): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:40.186301 kernel: audit: type=1300 audit(1755057160.139:1788): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028de940 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:40.139000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00177f840 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:40.191339 kernel: audit: type=1327 audit(1755057160.139:1788): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:40.139000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:40.139000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:40.139000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028de940 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:40.139000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:40.153000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:40.203964 kernel: audit: type=1400 audit(1755057160.153:1789): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:40.207280 kernel: audit: type=1300 audit(1755057160.153:1789): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028de960 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:40.153000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028de960 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:40.153000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:40.223943 kernel: audit: type=1327 audit(1755057160.153:1789): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:40.203000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:40.233954 kernel: audit: type=1400 audit(1755057160.203:1790): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:52:40.203000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00177f8a0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:52:40.203000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:52:40.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-10.244.16.30:22-139.178.89.65:50964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:40.763284 systemd[1]: Started sshd@36-10.244.16.30:22-139.178.89.65:50964.service. Aug 13 03:52:41.826563 sshd[6060]: Accepted publickey for core from 139.178.89.65 port 50964 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:52:41.825000 audit[6060]: USER_ACCT pid=6060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:41.829000 audit[6060]: CRED_ACQ pid=6060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:41.829000 audit[6060]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd148d49d0 a2=3 a3=0 items=0 ppid=1 pid=6060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:41.829000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:41.832318 sshd[6060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:52:41.852791 systemd[1]: Started session-34.scope. Aug 13 03:52:41.854968 systemd-logind[1192]: New session 34 of user core. Aug 13 03:52:41.867000 audit[6060]: USER_START pid=6060 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:41.870000 audit[6070]: CRED_ACQ pid=6070 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:43.387819 sshd[6060]: pam_unix(sshd:session): session closed for user core Aug 13 03:52:43.390000 audit[6060]: USER_END pid=6060 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:43.390000 audit[6060]: CRED_DISP pid=6060 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:43.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-10.244.16.30:22-139.178.89.65:50964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:43.393889 systemd-logind[1192]: Session 34 logged out. Waiting for processes to exit. Aug 13 03:52:43.395772 systemd[1]: sshd@36-10.244.16.30:22-139.178.89.65:50964.service: Deactivated successfully. Aug 13 03:52:43.397159 systemd[1]: session-34.scope: Deactivated successfully. Aug 13 03:52:43.399352 systemd-logind[1192]: Removed session 34. Aug 13 03:52:45.717834 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.HsV5li.mount: Deactivated successfully. Aug 13 03:52:45.932158 kernel: kauditd_printk_skb: 13 callbacks suppressed Aug 13 03:52:45.944786 kernel: audit: type=1400 audit(1755057165.919:1800): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:52:45.947941 kernel: audit: type=1300 audit(1755057165.919:1800): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001129420 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:52:45.949703 kernel: audit: type=1327 audit(1755057165.919:1800): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:52:45.919000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:52:45.919000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001129420 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:52:45.919000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:52:48.558223 systemd[1]: Started sshd@37-10.244.16.30:22-139.178.89.65:50976.service. Aug 13 03:52:48.578283 kernel: audit: type=1130 audit(1755057168.560:1801): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.244.16.30:22-139.178.89.65:50976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:48.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.244.16.30:22-139.178.89.65:50976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:49.554000 audit[6122]: USER_ACCT pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:49.574029 kernel: audit: type=1101 audit(1755057169.554:1802): pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:49.574197 sshd[6122]: Accepted publickey for core from 139.178.89.65 port 50976 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:52:49.592493 kernel: audit: type=1103 audit(1755057169.573:1803): pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:49.592670 kernel: audit: type=1006 audit(1755057169.573:1804): pid=6122 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Aug 13 03:52:49.592744 kernel: audit: type=1300 audit(1755057169.573:1804): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc0311dd0 a2=3 a3=0 items=0 ppid=1 pid=6122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:49.573000 audit[6122]: CRED_ACQ pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:49.573000 audit[6122]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc0311dd0 a2=3 a3=0 items=0 ppid=1 pid=6122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:49.599729 kernel: audit: type=1327 audit(1755057169.573:1804): proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:49.573000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:49.580275 sshd[6122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:52:49.640953 systemd[1]: Started session-35.scope. Aug 13 03:52:49.642048 systemd-logind[1192]: New session 35 of user core. Aug 13 03:52:49.651000 audit[6122]: USER_START pid=6122 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:49.661121 kernel: audit: type=1105 audit(1755057169.651:1805): pid=6122 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:49.654000 audit[6124]: CRED_ACQ pid=6124 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:51.021200 sshd[6122]: pam_unix(sshd:session): session closed for user core Aug 13 03:52:51.023000 audit[6122]: USER_END pid=6122 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:51.030438 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:52:51.031865 kernel: audit: type=1106 audit(1755057171.023:1807): pid=6122 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:51.029090 systemd[1]: sshd@37-10.244.16.30:22-139.178.89.65:50976.service: Deactivated successfully. Aug 13 03:52:51.041579 systemd[1]: session-35.scope: Deactivated successfully. Aug 13 03:52:51.023000 audit[6122]: CRED_DISP pid=6122 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:51.043428 systemd-logind[1192]: Session 35 logged out. Waiting for processes to exit. Aug 13 03:52:51.046259 systemd-logind[1192]: Removed session 35. Aug 13 03:52:51.051037 kernel: audit: type=1104 audit(1755057171.023:1808): pid=6122 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:51.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.244.16.30:22-139.178.89.65:50976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:51.060033 kernel: audit: type=1131 audit(1755057171.038:1809): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.244.16.30:22-139.178.89.65:50976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:52.662631 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.A96fL4.mount: Deactivated successfully. Aug 13 03:52:55.398000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:52:55.437558 kernel: audit: type=1400 audit(1755057175.398:1810): avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:52:55.439828 kernel: audit: type=1300 audit(1755057175.398:1810): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000588820 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:52:55.440067 kernel: audit: type=1327 audit(1755057175.398:1810): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:52:55.398000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000588820 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:52:55.398000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:52:56.195419 systemd[1]: Started sshd@38-10.244.16.30:22-139.178.89.65:46468.service. Aug 13 03:52:56.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.244.16.30:22-139.178.89.65:46468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:56.212213 kernel: audit: type=1130 audit(1755057176.201:1811): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.244.16.30:22-139.178.89.65:46468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:57.173000 audit[6176]: USER_ACCT pid=6176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:57.181731 sshd[6176]: Accepted publickey for core from 139.178.89.65 port 46468 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:52:57.186611 kernel: audit: type=1101 audit(1755057177.173:1812): pid=6176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:57.186703 kernel: audit: type=1103 audit(1755057177.182:1813): pid=6176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:57.182000 audit[6176]: CRED_ACQ pid=6176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:57.191280 sshd[6176]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:52:57.196017 kernel: audit: type=1006 audit(1755057177.182:1814): pid=6176 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Aug 13 03:52:57.182000 audit[6176]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdf0a9360 a2=3 a3=0 items=0 ppid=1 pid=6176 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:57.205161 kernel: audit: type=1300 audit(1755057177.182:1814): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdf0a9360 a2=3 a3=0 items=0 ppid=1 pid=6176 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:52:57.182000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:57.225027 kernel: audit: type=1327 audit(1755057177.182:1814): proctitle=737368643A20636F7265205B707269765D Aug 13 03:52:57.259581 systemd-logind[1192]: New session 36 of user core. Aug 13 03:52:57.260716 systemd[1]: Started session-36.scope. Aug 13 03:52:57.271000 audit[6176]: USER_START pid=6176 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:57.280054 kernel: audit: type=1105 audit(1755057177.271:1815): pid=6176 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:57.274000 audit[6178]: CRED_ACQ pid=6178 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:57.289068 kernel: audit: type=1103 audit(1755057177.274:1816): pid=6178 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:58.689081 sshd[6176]: pam_unix(sshd:session): session closed for user core Aug 13 03:52:58.692000 audit[6176]: USER_END pid=6176 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:58.703443 systemd[1]: sshd@38-10.244.16.30:22-139.178.89.65:46468.service: Deactivated successfully. Aug 13 03:52:58.707222 kernel: audit: type=1106 audit(1755057178.692:1817): pid=6176 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:58.705409 systemd[1]: session-36.scope: Deactivated successfully. Aug 13 03:52:58.693000 audit[6176]: CRED_DISP pid=6176 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:58.707741 systemd-logind[1192]: Session 36 logged out. Waiting for processes to exit. Aug 13 03:52:58.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.244.16.30:22-139.178.89.65:46468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:52:58.719861 kernel: audit: type=1104 audit(1755057178.693:1818): pid=6176 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:52:58.717835 systemd-logind[1192]: Removed session 36. Aug 13 03:53:03.872231 systemd[1]: Started sshd@39-10.244.16.30:22-139.178.89.65:52574.service. Aug 13 03:53:03.880975 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:53:03.882452 kernel: audit: type=1130 audit(1755057183.871:1820): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-10.244.16.30:22-139.178.89.65:52574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:03.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-10.244.16.30:22-139.178.89.65:52574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:04.912000 audit[6188]: USER_ACCT pid=6188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:04.918846 sshd[6188]: Accepted publickey for core from 139.178.89.65 port 52574 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:53:04.924053 kernel: audit: type=1101 audit(1755057184.912:1821): pid=6188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:04.934000 audit[6188]: CRED_ACQ pid=6188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:04.942020 kernel: audit: type=1103 audit(1755057184.934:1822): pid=6188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:04.947003 kernel: audit: type=1006 audit(1755057184.934:1823): pid=6188 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Aug 13 03:53:04.947593 sshd[6188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:53:04.934000 audit[6188]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc248c3b70 a2=3 a3=0 items=0 ppid=1 pid=6188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:04.955968 kernel: audit: type=1300 audit(1755057184.934:1823): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc248c3b70 a2=3 a3=0 items=0 ppid=1 pid=6188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:04.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:04.964415 kernel: audit: type=1327 audit(1755057184.934:1823): proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:04.969946 systemd-logind[1192]: New session 37 of user core. Aug 13 03:53:04.972854 systemd[1]: Started session-37.scope. Aug 13 03:53:04.980000 audit[6188]: USER_START pid=6188 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:04.989958 kernel: audit: type=1105 audit(1755057184.980:1824): pid=6188 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:04.990000 audit[6190]: CRED_ACQ pid=6190 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:05.001281 kernel: audit: type=1103 audit(1755057184.990:1825): pid=6190 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:06.697256 sshd[6188]: pam_unix(sshd:session): session closed for user core Aug 13 03:53:06.720764 kernel: audit: type=1106 audit(1755057186.700:1826): pid=6188 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:06.722883 kernel: audit: type=1104 audit(1755057186.700:1827): pid=6188 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:06.700000 audit[6188]: USER_END pid=6188 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:06.700000 audit[6188]: CRED_DISP pid=6188 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:06.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-10.244.16.30:22-139.178.89.65:52574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:06.708462 systemd[1]: sshd@39-10.244.16.30:22-139.178.89.65:52574.service: Deactivated successfully. Aug 13 03:53:06.714727 systemd[1]: session-37.scope: Deactivated successfully. Aug 13 03:53:06.715449 systemd-logind[1192]: Session 37 logged out. Waiting for processes to exit. Aug 13 03:53:06.717058 systemd-logind[1192]: Removed session 37. Aug 13 03:53:11.864790 systemd[1]: Started sshd@40-10.244.16.30:22-139.178.89.65:48660.service. Aug 13 03:53:11.881195 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:53:11.882978 kernel: audit: type=1130 audit(1755057191.864:1829): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-10.244.16.30:22-139.178.89.65:48660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:11.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-10.244.16.30:22-139.178.89.65:48660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:12.859000 audit[6201]: USER_ACCT pid=6201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:12.869256 kernel: audit: type=1101 audit(1755057192.859:1830): pid=6201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:12.869356 sshd[6201]: Accepted publickey for core from 139.178.89.65 port 48660 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:53:12.877000 audit[6201]: CRED_ACQ pid=6201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:12.884962 kernel: audit: type=1103 audit(1755057192.877:1831): pid=6201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:12.877000 audit[6201]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe33648150 a2=3 a3=0 items=0 ppid=1 pid=6201 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:12.898886 kernel: audit: type=1006 audit(1755057192.877:1832): pid=6201 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Aug 13 03:53:12.901975 kernel: audit: type=1300 audit(1755057192.877:1832): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe33648150 a2=3 a3=0 items=0 ppid=1 pid=6201 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:12.902059 kernel: audit: type=1327 audit(1755057192.877:1832): proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:12.877000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:12.899656 sshd[6201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:53:12.924982 systemd-logind[1192]: New session 38 of user core. Aug 13 03:53:12.927394 systemd[1]: Started session-38.scope. Aug 13 03:53:12.941000 audit[6201]: USER_START pid=6201 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:12.941000 audit[6203]: CRED_ACQ pid=6203 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:12.955736 kernel: audit: type=1105 audit(1755057192.941:1833): pid=6201 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:12.955908 kernel: audit: type=1103 audit(1755057192.941:1834): pid=6203 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:14.251124 sshd[6201]: pam_unix(sshd:session): session closed for user core Aug 13 03:53:14.267407 kernel: audit: type=1106 audit(1755057194.253:1835): pid=6201 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:14.267664 kernel: audit: type=1104 audit(1755057194.256:1836): pid=6201 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:14.253000 audit[6201]: USER_END pid=6201 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:14.256000 audit[6201]: CRED_DISP pid=6201 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:14.262986 systemd[1]: sshd@40-10.244.16.30:22-139.178.89.65:48660.service: Deactivated successfully. Aug 13 03:53:14.264708 systemd[1]: session-38.scope: Deactivated successfully. Aug 13 03:53:14.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-10.244.16.30:22-139.178.89.65:48660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:14.274132 systemd-logind[1192]: Session 38 logged out. Waiting for processes to exit. Aug 13 03:53:14.279659 systemd-logind[1192]: Removed session 38. Aug 13 03:53:15.694313 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.5kKm0G.mount: Deactivated successfully. Aug 13 03:53:19.444067 systemd[1]: Started sshd@41-10.244.16.30:22-139.178.89.65:34814.service. Aug 13 03:53:19.469890 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:53:19.473406 kernel: audit: type=1130 audit(1755057199.450:1838): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.244.16.30:22-139.178.89.65:34814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:19.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.244.16.30:22-139.178.89.65:34814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:20.555000 audit[6260]: USER_ACCT pid=6260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:20.589666 kernel: audit: type=1101 audit(1755057200.555:1839): pid=6260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:20.589832 kernel: audit: type=1103 audit(1755057200.567:1840): pid=6260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:20.590663 kernel: audit: type=1006 audit(1755057200.568:1841): pid=6260 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Aug 13 03:53:20.591388 kernel: audit: type=1300 audit(1755057200.568:1841): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfd5f1350 a2=3 a3=0 items=0 ppid=1 pid=6260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:20.567000 audit[6260]: CRED_ACQ pid=6260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:20.568000 audit[6260]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfd5f1350 a2=3 a3=0 items=0 ppid=1 pid=6260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:20.614056 kernel: audit: type=1327 audit(1755057200.568:1841): proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:20.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:20.614349 sshd[6260]: Accepted publickey for core from 139.178.89.65 port 34814 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:53:20.591201 sshd[6260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:53:20.634758 systemd-logind[1192]: New session 39 of user core. Aug 13 03:53:20.639894 systemd[1]: Started session-39.scope. Aug 13 03:53:20.655000 audit[6260]: USER_START pid=6260 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:20.664972 kernel: audit: type=1105 audit(1755057200.655:1842): pid=6260 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:20.655000 audit[6262]: CRED_ACQ pid=6262 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:20.673254 kernel: audit: type=1103 audit(1755057200.655:1843): pid=6262 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:20.883833 systemd[1]: run-containerd-runc-k8s.io-f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82-runc.ubcixh.mount: Deactivated successfully. Aug 13 03:53:22.237080 sshd[6260]: pam_unix(sshd:session): session closed for user core Aug 13 03:53:22.291781 kernel: audit: type=1106 audit(1755057202.258:1844): pid=6260 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:22.292520 kernel: audit: type=1104 audit(1755057202.258:1845): pid=6260 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:22.258000 audit[6260]: USER_END pid=6260 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:22.258000 audit[6260]: CRED_DISP pid=6260 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:22.296178 systemd[1]: sshd@41-10.244.16.30:22-139.178.89.65:34814.service: Deactivated successfully. Aug 13 03:53:22.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.244.16.30:22-139.178.89.65:34814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:22.300609 systemd[1]: session-39.scope: Deactivated successfully. Aug 13 03:53:22.306289 systemd-logind[1192]: Session 39 logged out. Waiting for processes to exit. Aug 13 03:53:22.313736 systemd-logind[1192]: Removed session 39. Aug 13 03:53:27.395106 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:53:27.405169 kernel: audit: type=1130 audit(1755057207.380:1847): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-10.244.16.30:22-139.178.89.65:34830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:27.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-10.244.16.30:22-139.178.89.65:34830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:27.380363 systemd[1]: Started sshd@42-10.244.16.30:22-139.178.89.65:34830.service. Aug 13 03:53:28.359000 audit[6307]: USER_ACCT pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:28.364187 sshd[6307]: Accepted publickey for core from 139.178.89.65 port 34830 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:53:28.369950 kernel: audit: type=1101 audit(1755057208.359:1848): pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:28.370000 audit[6307]: CRED_ACQ pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:28.374730 sshd[6307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:53:28.382847 kernel: audit: type=1103 audit(1755057208.370:1849): pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:28.383079 kernel: audit: type=1006 audit(1755057208.371:1850): pid=6307 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Aug 13 03:53:28.383162 kernel: audit: type=1300 audit(1755057208.371:1850): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd25628f0 a2=3 a3=0 items=0 ppid=1 pid=6307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:28.371000 audit[6307]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd25628f0 a2=3 a3=0 items=0 ppid=1 pid=6307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:28.410964 kernel: audit: type=1327 audit(1755057208.371:1850): proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:28.371000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:28.427132 systemd[1]: Started session-40.scope. Aug 13 03:53:28.429074 systemd-logind[1192]: New session 40 of user core. Aug 13 03:53:28.446949 kernel: audit: type=1105 audit(1755057208.438:1851): pid=6307 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:28.438000 audit[6307]: USER_START pid=6307 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:28.441000 audit[6309]: CRED_ACQ pid=6309 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:28.454973 kernel: audit: type=1103 audit(1755057208.441:1852): pid=6309 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:29.723836 sshd[6307]: pam_unix(sshd:session): session closed for user core Aug 13 03:53:29.726000 audit[6307]: USER_END pid=6307 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:29.742535 kernel: audit: type=1106 audit(1755057209.726:1853): pid=6307 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:29.743089 kernel: audit: type=1104 audit(1755057209.726:1854): pid=6307 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:29.726000 audit[6307]: CRED_DISP pid=6307 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:29.744378 systemd[1]: sshd@42-10.244.16.30:22-139.178.89.65:34830.service: Deactivated successfully. Aug 13 03:53:29.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-10.244.16.30:22-139.178.89.65:34830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:29.745674 systemd[1]: session-40.scope: Deactivated successfully. Aug 13 03:53:29.746971 systemd-logind[1192]: Session 40 logged out. Waiting for processes to exit. Aug 13 03:53:29.750009 systemd-logind[1192]: Removed session 40. Aug 13 03:53:31.635000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:31.635000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:31.635000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024ab2c0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:53:31.635000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:53:31.635000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00040d8e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:53:31.635000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:53:33.388000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.427264 kernel: kauditd_printk_skb: 7 callbacks suppressed Aug 13 03:53:33.428496 kernel: audit: type=1400 audit(1755057213.388:1858): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.428879 kernel: audit: type=1300 audit(1755057213.388:1858): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c011653bc0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:53:33.428991 kernel: audit: type=1327 audit(1755057213.388:1858): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:53:33.388000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c011653bc0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:53:33.388000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:53:33.393000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.393000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00794eab0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:53:33.448947 kernel: audit: type=1400 audit(1755057213.393:1859): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.449204 kernel: audit: type=1300 audit(1755057213.393:1859): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00794eab0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:53:33.393000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:53:33.456404 kernel: audit: type=1327 audit(1755057213.393:1859): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:53:33.394000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.463195 kernel: audit: type=1400 audit(1755057213.394:1860): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.463392 kernel: audit: type=1300 audit(1755057213.394:1860): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011653bf0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:53:33.394000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011653bf0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:53:33.394000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:53:33.398000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.485206 kernel: audit: type=1327 audit(1755057213.394:1860): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:53:33.485354 kernel: audit: type=1400 audit(1755057213.398:1861): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.398000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0104f07c0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:53:33.398000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:53:33.473000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.473000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006543080 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:53:33.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:53:33.474000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:33.474000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0104f0d40 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:53:33.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:53:34.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-10.244.16.30:22-139.178.89.65:49262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:34.904440 systemd[1]: Started sshd@43-10.244.16.30:22-139.178.89.65:49262.service. Aug 13 03:53:35.967000 audit[6320]: USER_ACCT pid=6320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:35.970965 sshd[6320]: Accepted publickey for core from 139.178.89.65 port 49262 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:53:35.970000 audit[6320]: CRED_ACQ pid=6320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:35.971000 audit[6320]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff35a0f30 a2=3 a3=0 items=0 ppid=1 pid=6320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:35.971000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:35.975433 sshd[6320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:53:35.989973 systemd-logind[1192]: New session 41 of user core. Aug 13 03:53:35.992683 systemd[1]: Started session-41.scope. Aug 13 03:53:36.003000 audit[6320]: USER_START pid=6320 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:36.006000 audit[6322]: CRED_ACQ pid=6322 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:37.670024 sshd[6320]: pam_unix(sshd:session): session closed for user core Aug 13 03:53:37.671000 audit[6320]: USER_END pid=6320 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:37.671000 audit[6320]: CRED_DISP pid=6320 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:37.680566 systemd[1]: sshd@43-10.244.16.30:22-139.178.89.65:49262.service: Deactivated successfully. Aug 13 03:53:37.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-10.244.16.30:22-139.178.89.65:49262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:37.683621 systemd[1]: session-41.scope: Deactivated successfully. Aug 13 03:53:37.684503 systemd-logind[1192]: Session 41 logged out. Waiting for processes to exit. Aug 13 03:53:37.688112 systemd-logind[1192]: Removed session 41. Aug 13 03:53:40.235128 kernel: kauditd_printk_skb: 19 callbacks suppressed Aug 13 03:53:40.240068 kernel: audit: type=1400 audit(1755057220.222:1873): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:40.241642 kernel: audit: type=1400 audit(1755057220.234:1874): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:40.222000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:40.251656 kernel: audit: type=1300 audit(1755057220.234:1874): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030d8c40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:53:40.234000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:40.234000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030d8c40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:53:40.234000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:53:40.265331 kernel: audit: type=1327 audit(1755057220.234:1874): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:53:40.222000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0031185c0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:53:40.281953 kernel: audit: type=1300 audit(1755057220.222:1873): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0031185c0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:53:40.222000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:53:40.291955 kernel: audit: type=1327 audit(1755057220.222:1873): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:53:40.239000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:40.239000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030d8de0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:53:40.311391 kernel: audit: type=1400 audit(1755057220.239:1875): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:40.311567 kernel: audit: type=1300 audit(1755057220.239:1875): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030d8de0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:53:40.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:53:40.323953 kernel: audit: type=1327 audit(1755057220.239:1875): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:53:40.239000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:40.239000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0031185e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:53:40.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:53:40.330960 kernel: audit: type=1400 audit(1755057220.239:1876): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:53:42.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-10.244.16.30:22-139.178.89.65:36316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:42.818673 systemd[1]: Started sshd@44-10.244.16.30:22-139.178.89.65:36316.service. Aug 13 03:53:43.801000 audit[6354]: USER_ACCT pid=6354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:43.805608 sshd[6354]: Accepted publickey for core from 139.178.89.65 port 36316 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:53:43.806000 audit[6354]: CRED_ACQ pid=6354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:43.806000 audit[6354]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2f260680 a2=3 a3=0 items=0 ppid=1 pid=6354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:43.806000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:43.809703 sshd[6354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:53:43.826003 systemd-logind[1192]: New session 42 of user core. Aug 13 03:53:43.827795 systemd[1]: Started session-42.scope. Aug 13 03:53:43.839000 audit[6354]: USER_START pid=6354 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:43.843000 audit[6356]: CRED_ACQ pid=6356 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:45.283572 sshd[6354]: pam_unix(sshd:session): session closed for user core Aug 13 03:53:45.295396 kernel: kauditd_printk_skb: 10 callbacks suppressed Aug 13 03:53:45.297956 kernel: audit: type=1106 audit(1755057225.285:1883): pid=6354 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:45.285000 audit[6354]: USER_END pid=6354 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:45.293274 systemd[1]: sshd@44-10.244.16.30:22-139.178.89.65:36316.service: Deactivated successfully. Aug 13 03:53:45.295249 systemd[1]: session-42.scope: Deactivated successfully. Aug 13 03:53:45.300011 systemd-logind[1192]: Session 42 logged out. Waiting for processes to exit. Aug 13 03:53:45.285000 audit[6354]: CRED_DISP pid=6354 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:45.301965 systemd-logind[1192]: Removed session 42. Aug 13 03:53:45.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-10.244.16.30:22-139.178.89.65:36316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:45.315701 kernel: audit: type=1104 audit(1755057225.285:1884): pid=6354 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:45.315885 kernel: audit: type=1131 audit(1755057225.292:1885): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-10.244.16.30:22-139.178.89.65:36316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:45.636341 systemd[1]: run-containerd-runc-k8s.io-7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099-runc.FrF3me.mount: Deactivated successfully. Aug 13 03:53:45.712330 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.mJo3uS.mount: Deactivated successfully. Aug 13 03:53:46.031000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:53:46.057830 kernel: audit: type=1400 audit(1755057226.031:1886): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:53:46.058903 kernel: audit: type=1300 audit(1755057226.031:1886): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001128240 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:53:46.031000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001128240 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:53:46.075734 kernel: audit: type=1327 audit(1755057226.031:1886): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:53:46.031000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:53:50.455613 systemd[1]: Started sshd@45-10.244.16.30:22-139.178.89.65:34298.service. Aug 13 03:53:50.485449 kernel: audit: type=1130 audit(1755057230.458:1887): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-10.244.16.30:22-139.178.89.65:34298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:50.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-10.244.16.30:22-139.178.89.65:34298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:51.460000 audit[6407]: USER_ACCT pid=6407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:51.469036 sshd[6407]: Accepted publickey for core from 139.178.89.65 port 34298 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:53:51.474948 kernel: audit: type=1101 audit(1755057231.460:1888): pid=6407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:51.475456 kernel: audit: type=1103 audit(1755057231.471:1889): pid=6407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:51.471000 audit[6407]: CRED_ACQ pid=6407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:51.485266 kernel: audit: type=1006 audit(1755057231.471:1890): pid=6407 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Aug 13 03:53:51.486560 kernel: audit: type=1300 audit(1755057231.471:1890): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6ea44d20 a2=3 a3=0 items=0 ppid=1 pid=6407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:51.471000 audit[6407]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6ea44d20 a2=3 a3=0 items=0 ppid=1 pid=6407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:51.485373 sshd[6407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:53:51.471000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:51.503146 kernel: audit: type=1327 audit(1755057231.471:1890): proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:51.540190 systemd-logind[1192]: New session 43 of user core. Aug 13 03:53:51.545451 systemd[1]: Started session-43.scope. Aug 13 03:53:51.553000 audit[6407]: USER_START pid=6407 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:51.563633 kernel: audit: type=1105 audit(1755057231.553:1891): pid=6407 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:51.564157 kernel: audit: type=1103 audit(1755057231.562:1892): pid=6427 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:51.562000 audit[6427]: CRED_ACQ pid=6427 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:52.713163 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.gr0a1V.mount: Deactivated successfully. Aug 13 03:53:53.099680 sshd[6407]: pam_unix(sshd:session): session closed for user core Aug 13 03:53:53.102000 audit[6407]: USER_END pid=6407 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:53.115584 kernel: audit: type=1106 audit(1755057233.102:1893): pid=6407 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:53.119717 systemd[1]: sshd@45-10.244.16.30:22-139.178.89.65:34298.service: Deactivated successfully. Aug 13 03:53:53.102000 audit[6407]: CRED_DISP pid=6407 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:53.122771 systemd[1]: session-43.scope: Deactivated successfully. Aug 13 03:53:53.128524 systemd-logind[1192]: Session 43 logged out. Waiting for processes to exit. Aug 13 03:53:53.130220 kernel: audit: type=1104 audit(1755057233.102:1894): pid=6407 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:53.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-10.244.16.30:22-139.178.89.65:34298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:53.131779 systemd-logind[1192]: Removed session 43. Aug 13 03:53:53.254482 systemd[1]: Started sshd@46-10.244.16.30:22-139.178.89.65:34302.service. Aug 13 03:53:53.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-10.244.16.30:22-139.178.89.65:34302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:54.223000 audit[6456]: USER_ACCT pid=6456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:54.225219 sshd[6456]: Accepted publickey for core from 139.178.89.65 port 34302 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:53:54.235000 audit[6456]: CRED_ACQ pid=6456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:54.235000 audit[6456]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef54deb30 a2=3 a3=0 items=0 ppid=1 pid=6456 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:54.235000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:54.238907 sshd[6456]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:53:54.255129 systemd-logind[1192]: New session 44 of user core. Aug 13 03:53:54.256171 systemd[1]: Started session-44.scope. Aug 13 03:53:54.263000 audit[6456]: USER_START pid=6456 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:54.267000 audit[6458]: CRED_ACQ pid=6458 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:55.453000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:53:55.453000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000588160 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:53:55.453000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:53:55.494709 sshd[6456]: pam_unix(sshd:session): session closed for user core Aug 13 03:53:55.496000 audit[6456]: USER_END pid=6456 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:55.500958 kernel: kauditd_printk_skb: 12 callbacks suppressed Aug 13 03:53:55.513656 kernel: audit: type=1106 audit(1755057235.496:1903): pid=6456 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:55.514042 kernel: audit: type=1104 audit(1755057235.496:1904): pid=6456 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:55.496000 audit[6456]: CRED_DISP pid=6456 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:55.510480 systemd[1]: sshd@46-10.244.16.30:22-139.178.89.65:34302.service: Deactivated successfully. Aug 13 03:53:55.511712 systemd[1]: session-44.scope: Deactivated successfully. Aug 13 03:53:55.517538 systemd-logind[1192]: Session 44 logged out. Waiting for processes to exit. Aug 13 03:53:55.518772 kernel: audit: type=1131 audit(1755057235.509:1905): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-10.244.16.30:22-139.178.89.65:34302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:55.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-10.244.16.30:22-139.178.89.65:34302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:55.527621 systemd-logind[1192]: Removed session 44. Aug 13 03:53:55.643432 systemd[1]: Started sshd@47-10.244.16.30:22-139.178.89.65:34316.service. Aug 13 03:53:55.651210 kernel: audit: type=1130 audit(1755057235.642:1906): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-10.244.16.30:22-139.178.89.65:34316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:55.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-10.244.16.30:22-139.178.89.65:34316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:56.621000 audit[6466]: USER_ACCT pid=6466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:56.635421 sshd[6466]: Accepted publickey for core from 139.178.89.65 port 34316 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:53:56.648967 kernel: audit: type=1101 audit(1755057236.621:1907): pid=6466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:56.653000 audit[6466]: CRED_ACQ pid=6466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:56.657332 sshd[6466]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:53:56.665188 kernel: audit: type=1103 audit(1755057236.653:1908): pid=6466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:56.665297 kernel: audit: type=1006 audit(1755057236.654:1909): pid=6466 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Aug 13 03:53:56.666340 kernel: audit: type=1300 audit(1755057236.654:1909): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8eb83190 a2=3 a3=0 items=0 ppid=1 pid=6466 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:56.654000 audit[6466]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8eb83190 a2=3 a3=0 items=0 ppid=1 pid=6466 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:53:56.676712 kernel: audit: type=1327 audit(1755057236.654:1909): proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:56.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:53:56.680365 systemd-logind[1192]: New session 45 of user core. Aug 13 03:53:56.682113 systemd[1]: Started session-45.scope. Aug 13 03:53:56.695000 audit[6466]: USER_START pid=6466 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:56.704006 kernel: audit: type=1105 audit(1755057236.695:1910): pid=6466 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:56.703000 audit[6474]: CRED_ACQ pid=6474 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:59.122532 sshd[6466]: pam_unix(sshd:session): session closed for user core Aug 13 03:53:59.159000 audit[6466]: USER_END pid=6466 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:59.162000 audit[6466]: CRED_DISP pid=6466 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:53:59.180861 systemd[1]: sshd@47-10.244.16.30:22-139.178.89.65:34316.service: Deactivated successfully. Aug 13 03:53:59.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-10.244.16.30:22-139.178.89.65:34316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:53:59.189012 systemd[1]: session-45.scope: Deactivated successfully. Aug 13 03:53:59.191706 systemd-logind[1192]: Session 45 logged out. Waiting for processes to exit. Aug 13 03:53:59.197757 systemd-logind[1192]: Removed session 45. Aug 13 03:54:04.295660 systemd[1]: Started sshd@48-10.244.16.30:22-139.178.89.65:43868.service. Aug 13 03:54:04.320217 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:54:04.324649 kernel: audit: type=1130 audit(1755057244.295:1915): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-10.244.16.30:22-139.178.89.65:43868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:04.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-10.244.16.30:22-139.178.89.65:43868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:05.304000 audit[6486]: USER_ACCT pid=6486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:05.310889 sshd[6486]: Accepted publickey for core from 139.178.89.65 port 43868 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:54:05.318156 kernel: audit: type=1101 audit(1755057245.304:1916): pid=6486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:05.317000 audit[6486]: CRED_ACQ pid=6486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:05.327227 kernel: audit: type=1103 audit(1755057245.317:1917): pid=6486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:05.327520 kernel: audit: type=1006 audit(1755057245.318:1918): pid=6486 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=46 res=1 Aug 13 03:54:05.339330 kernel: audit: type=1300 audit(1755057245.318:1918): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc79202980 a2=3 a3=0 items=0 ppid=1 pid=6486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:05.318000 audit[6486]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc79202980 a2=3 a3=0 items=0 ppid=1 pid=6486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:05.352826 kernel: audit: type=1327 audit(1755057245.318:1918): proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:05.318000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:05.340342 sshd[6486]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:54:05.396870 systemd[1]: Started session-46.scope. Aug 13 03:54:05.399303 systemd-logind[1192]: New session 46 of user core. Aug 13 03:54:05.407000 audit[6486]: USER_START pid=6486 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:05.417974 kernel: audit: type=1105 audit(1755057245.407:1919): pid=6486 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:05.416000 audit[6488]: CRED_ACQ pid=6488 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:05.425967 kernel: audit: type=1103 audit(1755057245.416:1920): pid=6488 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:06.695822 sshd[6486]: pam_unix(sshd:session): session closed for user core Aug 13 03:54:06.705000 audit[6486]: USER_END pid=6486 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:06.719358 kernel: audit: type=1106 audit(1755057246.705:1921): pid=6486 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:06.705000 audit[6486]: CRED_DISP pid=6486 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:06.725438 systemd[1]: sshd@48-10.244.16.30:22-139.178.89.65:43868.service: Deactivated successfully. Aug 13 03:54:06.727019 systemd[1]: session-46.scope: Deactivated successfully. Aug 13 03:54:06.734219 kernel: audit: type=1104 audit(1755057246.705:1922): pid=6486 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:06.736151 systemd-logind[1192]: Session 46 logged out. Waiting for processes to exit. Aug 13 03:54:06.738462 systemd-logind[1192]: Removed session 46. Aug 13 03:54:06.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-10.244.16.30:22-139.178.89.65:43868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:11.845642 systemd[1]: Started sshd@49-10.244.16.30:22-139.178.89.65:54728.service. Aug 13 03:54:11.861172 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:54:11.864532 kernel: audit: type=1130 audit(1755057251.847:1924): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-10.244.16.30:22-139.178.89.65:54728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:11.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-10.244.16.30:22-139.178.89.65:54728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:12.851000 audit[6498]: USER_ACCT pid=6498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:12.861547 sshd[6498]: Accepted publickey for core from 139.178.89.65 port 54728 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:54:12.866980 kernel: audit: type=1101 audit(1755057252.851:1925): pid=6498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:12.868000 audit[6498]: CRED_ACQ pid=6498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:12.891838 kernel: audit: type=1103 audit(1755057252.868:1926): pid=6498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:12.892009 kernel: audit: type=1006 audit(1755057252.869:1927): pid=6498 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=47 res=1 Aug 13 03:54:12.892098 kernel: audit: type=1300 audit(1755057252.869:1927): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd08d2360 a2=3 a3=0 items=0 ppid=1 pid=6498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:12.902202 kernel: audit: type=1327 audit(1755057252.869:1927): proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:12.869000 audit[6498]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd08d2360 a2=3 a3=0 items=0 ppid=1 pid=6498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:12.869000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:12.878971 sshd[6498]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:54:12.918808 systemd-logind[1192]: New session 47 of user core. Aug 13 03:54:12.920303 systemd[1]: Started session-47.scope. Aug 13 03:54:12.941559 kernel: audit: type=1105 audit(1755057252.929:1928): pid=6498 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:12.929000 audit[6498]: USER_START pid=6498 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:12.940000 audit[6500]: CRED_ACQ pid=6500 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:12.949209 kernel: audit: type=1103 audit(1755057252.940:1929): pid=6500 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:14.320218 sshd[6498]: pam_unix(sshd:session): session closed for user core Aug 13 03:54:14.328000 audit[6498]: USER_END pid=6498 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:14.343343 kernel: audit: type=1106 audit(1755057254.328:1930): pid=6498 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:14.343470 kernel: audit: type=1104 audit(1755057254.341:1931): pid=6498 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:14.341000 audit[6498]: CRED_DISP pid=6498 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:14.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-10.244.16.30:22-139.178.89.65:54728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:14.354670 systemd[1]: sshd@49-10.244.16.30:22-139.178.89.65:54728.service: Deactivated successfully. Aug 13 03:54:14.358240 systemd[1]: session-47.scope: Deactivated successfully. Aug 13 03:54:14.361538 systemd-logind[1192]: Session 47 logged out. Waiting for processes to exit. Aug 13 03:54:14.362976 systemd-logind[1192]: Removed session 47. Aug 13 03:54:15.688873 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.cJocf0.mount: Deactivated successfully. Aug 13 03:54:19.512740 systemd[1]: Started sshd@50-10.244.16.30:22-139.178.89.65:40526.service. Aug 13 03:54:19.537621 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:54:19.543967 kernel: audit: type=1130 audit(1755057259.515:1933): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-10.244.16.30:22-139.178.89.65:40526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:19.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-10.244.16.30:22-139.178.89.65:40526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:20.581000 audit[6552]: USER_ACCT pid=6552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:20.625749 kernel: audit: type=1101 audit(1755057260.581:1934): pid=6552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:20.626056 kernel: audit: type=1103 audit(1755057260.599:1935): pid=6552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:20.626497 kernel: audit: type=1006 audit(1755057260.599:1936): pid=6552 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Aug 13 03:54:20.627281 kernel: audit: type=1300 audit(1755057260.599:1936): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde48e550 a2=3 a3=0 items=0 ppid=1 pid=6552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:20.627415 kernel: audit: type=1327 audit(1755057260.599:1936): proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:20.599000 audit[6552]: CRED_ACQ pid=6552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:20.599000 audit[6552]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde48e550 a2=3 a3=0 items=0 ppid=1 pid=6552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:20.599000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:20.641856 sshd[6552]: Accepted publickey for core from 139.178.89.65 port 40526 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:54:20.607807 sshd[6552]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:54:20.659783 systemd-logind[1192]: New session 48 of user core. Aug 13 03:54:20.668051 systemd[1]: Started session-48.scope. Aug 13 03:54:20.679000 audit[6552]: USER_START pid=6552 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:20.688034 kernel: audit: type=1105 audit(1755057260.679:1937): pid=6552 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:20.687000 audit[6554]: CRED_ACQ pid=6554 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:20.695966 kernel: audit: type=1103 audit(1755057260.687:1938): pid=6554 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:22.183872 sshd[6552]: pam_unix(sshd:session): session closed for user core Aug 13 03:54:22.235270 kernel: audit: type=1106 audit(1755057262.213:1939): pid=6552 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:22.236303 kernel: audit: type=1104 audit(1755057262.213:1940): pid=6552 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:22.213000 audit[6552]: USER_END pid=6552 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:22.213000 audit[6552]: CRED_DISP pid=6552 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:22.233458 systemd[1]: sshd@50-10.244.16.30:22-139.178.89.65:40526.service: Deactivated successfully. Aug 13 03:54:22.244537 systemd[1]: session-48.scope: Deactivated successfully. Aug 13 03:54:22.245419 systemd-logind[1192]: Session 48 logged out. Waiting for processes to exit. Aug 13 03:54:22.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-10.244.16.30:22-139.178.89.65:40526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:22.253095 systemd-logind[1192]: Removed session 48. Aug 13 03:54:27.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-10.244.16.30:22-139.178.89.65:40538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:27.344273 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:54:27.345397 kernel: audit: type=1130 audit(1755057267.326:1942): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-10.244.16.30:22-139.178.89.65:40538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:27.326907 systemd[1]: Started sshd@51-10.244.16.30:22-139.178.89.65:40538.service. Aug 13 03:54:28.299000 audit[6583]: USER_ACCT pid=6583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:28.304218 sshd[6583]: Accepted publickey for core from 139.178.89.65 port 40538 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:54:28.310285 kernel: audit: type=1101 audit(1755057268.299:1943): pid=6583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:28.310464 kernel: audit: type=1103 audit(1755057268.308:1944): pid=6583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:28.308000 audit[6583]: CRED_ACQ pid=6583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:28.320485 kernel: audit: type=1006 audit(1755057268.308:1945): pid=6583 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Aug 13 03:54:28.320694 kernel: audit: type=1300 audit(1755057268.308:1945): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe081d5510 a2=3 a3=0 items=0 ppid=1 pid=6583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:28.308000 audit[6583]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe081d5510 a2=3 a3=0 items=0 ppid=1 pid=6583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:28.330337 kernel: audit: type=1327 audit(1755057268.308:1945): proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:28.308000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:28.327944 sshd[6583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:54:28.358753 systemd-logind[1192]: New session 49 of user core. Aug 13 03:54:28.360150 systemd[1]: Started session-49.scope. Aug 13 03:54:28.371000 audit[6583]: USER_START pid=6583 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:28.380000 audit[6585]: CRED_ACQ pid=6585 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:28.388050 kernel: audit: type=1105 audit(1755057268.371:1946): pid=6583 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:28.388181 kernel: audit: type=1103 audit(1755057268.380:1947): pid=6585 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:29.653740 sshd[6583]: pam_unix(sshd:session): session closed for user core Aug 13 03:54:29.667000 audit[6583]: USER_END pid=6583 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:29.678988 kernel: audit: type=1106 audit(1755057269.667:1948): pid=6583 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:29.673000 audit[6583]: CRED_DISP pid=6583 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:29.719275 kernel: audit: type=1104 audit(1755057269.673:1949): pid=6583 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:29.724483 systemd[1]: sshd@51-10.244.16.30:22-139.178.89.65:40538.service: Deactivated successfully. Aug 13 03:54:29.729997 systemd[1]: session-49.scope: Deactivated successfully. Aug 13 03:54:29.731444 systemd-logind[1192]: Session 49 logged out. Waiting for processes to exit. Aug 13 03:54:29.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-10.244.16.30:22-139.178.89.65:40538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:29.733973 systemd-logind[1192]: Removed session 49. Aug 13 03:54:31.645000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:31.645000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:31.645000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000914090 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:54:31.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:54:31.645000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d80740 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:54:31.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:54:33.400000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.403190 kernel: kauditd_printk_skb: 7 callbacks suppressed Aug 13 03:54:33.406493 kernel: audit: type=1400 audit(1755057273.400:1953): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.402000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.416165 kernel: audit: type=1400 audit(1755057273.402:1954): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.402000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0080a7e80 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:54:33.436002 kernel: audit: type=1300 audit(1755057273.402:1954): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0080a7e80 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:54:33.402000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:54:33.448026 kernel: audit: type=1327 audit(1755057273.402:1954): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:54:33.400000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c004eafda0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:54:33.460996 kernel: audit: type=1300 audit(1755057273.400:1953): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c004eafda0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:54:33.400000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:54:33.471979 kernel: audit: type=1327 audit(1755057273.400:1953): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:54:33.413000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.480975 kernel: audit: type=1400 audit(1755057273.413:1955): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.413000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c005bd0630 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:54:33.492991 kernel: audit: type=1300 audit(1755057273.413:1955): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c005bd0630 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:54:33.413000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:54:33.502000 kernel: audit: type=1327 audit(1755057273.413:1955): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:54:33.413000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.509410 kernel: audit: type=1400 audit(1755057273.413:1956): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.413000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c005bd0660 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:54:33.413000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:54:33.473000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.473000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c005a99ae0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:54:33.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:54:33.473000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:33.473000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c003e966c0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:54:33.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:54:34.819366 systemd[1]: Started sshd@52-10.244.16.30:22-139.178.89.65:56698.service. Aug 13 03:54:34.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-10.244.16.30:22-139.178.89.65:56698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:35.841000 audit[6595]: USER_ACCT pid=6595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:35.843000 audit[6595]: CRED_ACQ pid=6595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:35.843000 audit[6595]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3080ea10 a2=3 a3=0 items=0 ppid=1 pid=6595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:35.843000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:35.864174 sshd[6595]: Accepted publickey for core from 139.178.89.65 port 56698 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:54:35.847806 sshd[6595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:54:35.877325 systemd-logind[1192]: New session 50 of user core. Aug 13 03:54:35.879517 systemd[1]: Started session-50.scope. Aug 13 03:54:35.887000 audit[6595]: USER_START pid=6595 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:35.890000 audit[6597]: CRED_ACQ pid=6597 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:37.403415 sshd[6595]: pam_unix(sshd:session): session closed for user core Aug 13 03:54:37.406000 audit[6595]: USER_END pid=6595 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:37.406000 audit[6595]: CRED_DISP pid=6595 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:37.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-10.244.16.30:22-139.178.89.65:56698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:37.410051 systemd-logind[1192]: Session 50 logged out. Waiting for processes to exit. Aug 13 03:54:37.411667 systemd[1]: sshd@52-10.244.16.30:22-139.178.89.65:56698.service: Deactivated successfully. Aug 13 03:54:37.413209 systemd[1]: session-50.scope: Deactivated successfully. Aug 13 03:54:37.419582 systemd-logind[1192]: Removed session 50. Aug 13 03:54:40.250000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:40.329492 kernel: kauditd_printk_skb: 19 callbacks suppressed Aug 13 03:54:40.366009 kernel: audit: type=1400 audit(1755057280.250:1968): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:40.369047 kernel: audit: type=1300 audit(1755057280.250:1968): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bfe000 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:54:40.369143 kernel: audit: type=1327 audit(1755057280.250:1968): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:54:40.370799 kernel: audit: type=1400 audit(1755057280.266:1969): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:40.370903 kernel: audit: type=1300 audit(1755057280.266:1969): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028dfa40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:54:40.371086 kernel: audit: type=1327 audit(1755057280.266:1969): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:54:40.371184 kernel: audit: type=1400 audit(1755057280.288:1970): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:40.371244 kernel: audit: type=1300 audit(1755057280.288:1970): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028dfa60 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:54:40.250000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bfe000 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:54:40.392048 kernel: audit: type=1327 audit(1755057280.288:1970): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:54:40.394236 kernel: audit: type=1400 audit(1755057280.361:1971): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:40.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:54:40.266000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:40.266000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028dfa40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:54:40.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:54:40.288000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:40.288000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028dfa60 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:54:40.288000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:54:40.361000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:54:40.361000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bfe080 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:54:40.361000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:54:42.593625 systemd[1]: Started sshd@53-10.244.16.30:22-139.178.89.65:55474.service. Aug 13 03:54:42.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-10.244.16.30:22-139.178.89.65:55474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:43.622000 audit[6629]: USER_ACCT pid=6629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:43.625000 audit[6629]: CRED_ACQ pid=6629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:43.626000 audit[6629]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe728d34f0 a2=3 a3=0 items=0 ppid=1 pid=6629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:43.626000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:43.640337 sshd[6629]: Accepted publickey for core from 139.178.89.65 port 55474 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:54:43.639022 sshd[6629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:54:43.663267 systemd-logind[1192]: New session 51 of user core. Aug 13 03:54:43.664595 systemd[1]: Started session-51.scope. Aug 13 03:54:43.673000 audit[6629]: USER_START pid=6629 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:43.676000 audit[6631]: CRED_ACQ pid=6631 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:45.633280 sshd[6629]: pam_unix(sshd:session): session closed for user core Aug 13 03:54:45.655179 kernel: kauditd_printk_skb: 10 callbacks suppressed Aug 13 03:54:45.657387 kernel: audit: type=1106 audit(1755057285.635:1978): pid=6629 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:45.657709 kernel: audit: type=1104 audit(1755057285.640:1979): pid=6629 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:45.635000 audit[6629]: USER_END pid=6629 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:45.640000 audit[6629]: CRED_DISP pid=6629 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:45.650334 systemd[1]: sshd@53-10.244.16.30:22-139.178.89.65:55474.service: Deactivated successfully. Aug 13 03:54:45.660224 systemd[1]: session-51.scope: Deactivated successfully. Aug 13 03:54:45.666488 systemd-logind[1192]: Session 51 logged out. Waiting for processes to exit. Aug 13 03:54:45.668339 systemd-logind[1192]: Removed session 51. Aug 13 03:54:45.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-10.244.16.30:22-139.178.89.65:55474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:45.676019 kernel: audit: type=1131 audit(1755057285.649:1980): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-10.244.16.30:22-139.178.89.65:55474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:45.773459 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.VBEjxX.mount: Deactivated successfully. Aug 13 03:54:46.097000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:54:46.106970 kernel: audit: type=1400 audit(1755057286.097:1981): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:54:46.097000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00220b140 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:54:46.122540 kernel: audit: type=1300 audit(1755057286.097:1981): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00220b140 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:54:46.097000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:54:46.131963 kernel: audit: type=1327 audit(1755057286.097:1981): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:54:50.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-10.244.16.30:22-139.178.89.65:35244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:50.869398 kernel: audit: type=1130 audit(1755057290.843:1982): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-10.244.16.30:22-139.178.89.65:35244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:50.844116 systemd[1]: Started sshd@54-10.244.16.30:22-139.178.89.65:35244.service. Aug 13 03:54:51.961000 audit[6687]: USER_ACCT pid=6687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:51.987867 kernel: audit: type=1101 audit(1755057291.961:1983): pid=6687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:51.988656 kernel: audit: type=1103 audit(1755057291.975:1984): pid=6687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:51.989059 kernel: audit: type=1006 audit(1755057291.976:1985): pid=6687 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Aug 13 03:54:51.989425 kernel: audit: type=1300 audit(1755057291.976:1985): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc426f7310 a2=3 a3=0 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:51.975000 audit[6687]: CRED_ACQ pid=6687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:51.976000 audit[6687]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc426f7310 a2=3 a3=0 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:54:52.000942 sshd[6687]: Accepted publickey for core from 139.178.89.65 port 35244 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:54:51.976000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:51.980165 sshd[6687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:54:52.006730 kernel: audit: type=1327 audit(1755057291.976:1985): proctitle=737368643A20636F7265205B707269765D Aug 13 03:54:52.046178 systemd[1]: Started session-52.scope. Aug 13 03:54:52.046482 systemd-logind[1192]: New session 52 of user core. Aug 13 03:54:52.070000 audit[6687]: USER_START pid=6687 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:52.080662 kernel: audit: type=1105 audit(1755057292.070:1986): pid=6687 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:52.080784 kernel: audit: type=1103 audit(1755057292.070:1987): pid=6716 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:52.070000 audit[6716]: CRED_ACQ pid=6716 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:54.431160 sshd[6687]: pam_unix(sshd:session): session closed for user core Aug 13 03:54:54.461000 audit[6687]: USER_END pid=6687 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:54.481708 kernel: audit: type=1106 audit(1755057294.461:1988): pid=6687 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:54.487052 kernel: audit: type=1104 audit(1755057294.465:1989): pid=6687 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:54.465000 audit[6687]: CRED_DISP pid=6687 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:54:54.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-10.244.16.30:22-139.178.89.65:35244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:54.486147 systemd-logind[1192]: Session 52 logged out. Waiting for processes to exit. Aug 13 03:54:54.489804 systemd[1]: sshd@54-10.244.16.30:22-139.178.89.65:35244.service: Deactivated successfully. Aug 13 03:54:54.501596 systemd[1]: session-52.scope: Deactivated successfully. Aug 13 03:54:54.512692 systemd-logind[1192]: Removed session 52. Aug 13 03:54:55.463000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:54:55.463000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002952cc0 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:54:55.463000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:54:59.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-10.244.16.30:22-139.178.89.65:47798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:59.595735 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:54:59.596664 kernel: audit: type=1130 audit(1755057299.585:1992): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-10.244.16.30:22-139.178.89.65:47798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:54:59.585601 systemd[1]: Started sshd@55-10.244.16.30:22-139.178.89.65:47798.service. Aug 13 03:55:00.627000 audit[6746]: USER_ACCT pid=6746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:00.636500 sshd[6746]: Accepted publickey for core from 139.178.89.65 port 47798 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:55:00.641906 kernel: audit: type=1101 audit(1755057300.627:1993): pid=6746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:00.640000 audit[6746]: CRED_ACQ pid=6746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:00.644725 sshd[6746]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:55:00.654621 kernel: audit: type=1103 audit(1755057300.640:1994): pid=6746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:00.655222 kernel: audit: type=1006 audit(1755057300.641:1995): pid=6746 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Aug 13 03:55:00.641000 audit[6746]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc2dd4620 a2=3 a3=0 items=0 ppid=1 pid=6746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:00.680272 kernel: audit: type=1300 audit(1755057300.641:1995): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc2dd4620 a2=3 a3=0 items=0 ppid=1 pid=6746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:00.641000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:00.683980 kernel: audit: type=1327 audit(1755057300.641:1995): proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:00.708137 systemd-logind[1192]: New session 53 of user core. Aug 13 03:55:00.709999 systemd[1]: Started session-53.scope. Aug 13 03:55:00.720000 audit[6746]: USER_START pid=6746 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:00.735879 kernel: audit: type=1105 audit(1755057300.720:1996): pid=6746 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:00.736068 kernel: audit: type=1103 audit(1755057300.723:1997): pid=6748 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:00.723000 audit[6748]: CRED_ACQ pid=6748 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:02.833583 sshd[6746]: pam_unix(sshd:session): session closed for user core Aug 13 03:55:02.864645 kernel: audit: type=1106 audit(1755057302.843:1998): pid=6746 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:02.865067 kernel: audit: type=1104 audit(1755057302.855:1999): pid=6746 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:02.843000 audit[6746]: USER_END pid=6746 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:02.855000 audit[6746]: CRED_DISP pid=6746 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:02.871425 systemd[1]: sshd@55-10.244.16.30:22-139.178.89.65:47798.service: Deactivated successfully. Aug 13 03:55:02.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-10.244.16.30:22-139.178.89.65:47798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:02.878147 systemd[1]: session-53.scope: Deactivated successfully. Aug 13 03:55:02.879912 systemd-logind[1192]: Session 53 logged out. Waiting for processes to exit. Aug 13 03:55:02.881584 systemd-logind[1192]: Removed session 53. Aug 13 03:55:08.001400 systemd[1]: Started sshd@56-10.244.16.30:22-139.178.89.65:47812.service. Aug 13 03:55:08.020664 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:55:08.025441 kernel: audit: type=1130 audit(1755057308.003:2001): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-10.244.16.30:22-139.178.89.65:47812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:08.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-10.244.16.30:22-139.178.89.65:47812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:09.063000 audit[6771]: USER_ACCT pid=6771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:09.075289 sshd[6771]: Accepted publickey for core from 139.178.89.65 port 47812 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:55:09.080323 kernel: audit: type=1101 audit(1755057309.063:2002): pid=6771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:09.081000 audit[6771]: CRED_ACQ pid=6771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:09.092764 kernel: audit: type=1103 audit(1755057309.081:2003): pid=6771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:09.093132 kernel: audit: type=1006 audit(1755057309.081:2004): pid=6771 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Aug 13 03:55:09.094658 kernel: audit: type=1300 audit(1755057309.081:2004): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8685fcf0 a2=3 a3=0 items=0 ppid=1 pid=6771 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:09.081000 audit[6771]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8685fcf0 a2=3 a3=0 items=0 ppid=1 pid=6771 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:09.108876 kernel: audit: type=1327 audit(1755057309.081:2004): proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:09.081000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:09.093541 sshd[6771]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:55:09.123254 systemd-logind[1192]: New session 54 of user core. Aug 13 03:55:09.126140 systemd[1]: Started session-54.scope. Aug 13 03:55:09.137000 audit[6771]: USER_START pid=6771 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:09.147076 kernel: audit: type=1105 audit(1755057309.137:2005): pid=6771 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:09.147000 audit[6773]: CRED_ACQ pid=6773 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:09.157091 kernel: audit: type=1103 audit(1755057309.147:2006): pid=6773 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:10.583418 sshd[6771]: pam_unix(sshd:session): session closed for user core Aug 13 03:55:10.606514 kernel: audit: type=1106 audit(1755057310.585:2007): pid=6771 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:10.607569 kernel: audit: type=1104 audit(1755057310.585:2008): pid=6771 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:10.585000 audit[6771]: USER_END pid=6771 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:10.585000 audit[6771]: CRED_DISP pid=6771 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:10.627691 systemd[1]: sshd@56-10.244.16.30:22-139.178.89.65:47812.service: Deactivated successfully. Aug 13 03:55:10.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-10.244.16.30:22-139.178.89.65:47812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:10.632352 systemd[1]: session-54.scope: Deactivated successfully. Aug 13 03:55:10.634489 systemd-logind[1192]: Session 54 logged out. Waiting for processes to exit. Aug 13 03:55:10.640039 systemd-logind[1192]: Removed session 54. Aug 13 03:55:15.731404 systemd[1]: Started sshd@57-10.244.16.30:22-139.178.89.65:36782.service. Aug 13 03:55:15.772233 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:55:15.775522 kernel: audit: type=1130 audit(1755057315.735:2010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-10.244.16.30:22-139.178.89.65:36782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:15.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-10.244.16.30:22-139.178.89.65:36782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:16.767000 audit[6819]: USER_ACCT pid=6819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:16.782344 kernel: audit: type=1101 audit(1755057316.767:2011): pid=6819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:16.782455 sshd[6819]: Accepted publickey for core from 139.178.89.65 port 36782 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:55:16.778000 audit[6819]: CRED_ACQ pid=6819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:16.782151 sshd[6819]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:55:16.792974 kernel: audit: type=1103 audit(1755057316.778:2012): pid=6819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:16.778000 audit[6819]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc30553270 a2=3 a3=0 items=0 ppid=1 pid=6819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:16.807987 kernel: audit: type=1006 audit(1755057316.778:2013): pid=6819 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=55 res=1 Aug 13 03:55:16.808135 kernel: audit: type=1300 audit(1755057316.778:2013): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc30553270 a2=3 a3=0 items=0 ppid=1 pid=6819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:16.808208 kernel: audit: type=1327 audit(1755057316.778:2013): proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:16.778000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:16.832233 systemd-logind[1192]: New session 55 of user core. Aug 13 03:55:16.835308 systemd[1]: Started session-55.scope. Aug 13 03:55:16.845000 audit[6819]: USER_START pid=6819 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:16.855215 kernel: audit: type=1105 audit(1755057316.845:2014): pid=6819 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:16.854000 audit[6829]: CRED_ACQ pid=6829 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:16.861982 kernel: audit: type=1103 audit(1755057316.854:2015): pid=6829 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:18.251380 sshd[6819]: pam_unix(sshd:session): session closed for user core Aug 13 03:55:18.278763 kernel: audit: type=1106 audit(1755057318.255:2016): pid=6819 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:18.255000 audit[6819]: USER_END pid=6819 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:18.283601 systemd-logind[1192]: Session 55 logged out. Waiting for processes to exit. Aug 13 03:55:18.286014 systemd[1]: sshd@57-10.244.16.30:22-139.178.89.65:36782.service: Deactivated successfully. Aug 13 03:55:18.274000 audit[6819]: CRED_DISP pid=6819 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:18.298951 kernel: audit: type=1104 audit(1755057318.274:2017): pid=6819 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:18.289416 systemd[1]: session-55.scope: Deactivated successfully. Aug 13 03:55:18.299567 systemd-logind[1192]: Removed session 55. Aug 13 03:55:18.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-10.244.16.30:22-139.178.89.65:36782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:23.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-10.244.16.30:22-139.178.89.65:58584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:23.565268 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:55:23.568374 kernel: audit: type=1130 audit(1755057323.514:2019): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-10.244.16.30:22-139.178.89.65:58584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:23.513815 systemd[1]: Started sshd@58-10.244.16.30:22-139.178.89.65:58584.service. Aug 13 03:55:24.531000 audit[6861]: USER_ACCT pid=6861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:24.545207 kernel: audit: type=1101 audit(1755057324.531:2020): pid=6861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:24.545451 sshd[6861]: Accepted publickey for core from 139.178.89.65 port 58584 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:55:24.545000 audit[6861]: CRED_ACQ pid=6861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:24.550495 sshd[6861]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:55:24.556232 kernel: audit: type=1103 audit(1755057324.545:2021): pid=6861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:24.546000 audit[6861]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde2b1780 a2=3 a3=0 items=0 ppid=1 pid=6861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:24.573110 kernel: audit: type=1006 audit(1755057324.546:2022): pid=6861 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=56 res=1 Aug 13 03:55:24.573275 kernel: audit: type=1300 audit(1755057324.546:2022): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde2b1780 a2=3 a3=0 items=0 ppid=1 pid=6861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:24.573351 kernel: audit: type=1327 audit(1755057324.546:2022): proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:24.546000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:24.600092 systemd-logind[1192]: New session 56 of user core. Aug 13 03:55:24.604827 systemd[1]: Started session-56.scope. Aug 13 03:55:24.624000 audit[6861]: USER_START pid=6861 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:24.634104 kernel: audit: type=1105 audit(1755057324.624:2023): pid=6861 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:24.624000 audit[6864]: CRED_ACQ pid=6864 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:24.643450 kernel: audit: type=1103 audit(1755057324.624:2024): pid=6864 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:26.138275 sshd[6861]: pam_unix(sshd:session): session closed for user core Aug 13 03:55:26.138000 audit[6861]: USER_END pid=6861 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:26.150055 systemd[1]: sshd@58-10.244.16.30:22-139.178.89.65:58584.service: Deactivated successfully. Aug 13 03:55:26.159447 kernel: audit: type=1106 audit(1755057326.138:2025): pid=6861 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:26.157619 systemd[1]: session-56.scope: Deactivated successfully. Aug 13 03:55:26.159386 systemd-logind[1192]: Session 56 logged out. Waiting for processes to exit. Aug 13 03:55:26.161158 systemd-logind[1192]: Removed session 56. Aug 13 03:55:26.139000 audit[6861]: CRED_DISP pid=6861 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:26.169972 kernel: audit: type=1104 audit(1755057326.139:2026): pid=6861 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:26.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-10.244.16.30:22-139.178.89.65:58584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:31.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-10.244.16.30:22-139.178.89.65:51638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:31.312967 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:55:31.317915 kernel: audit: type=1130 audit(1755057331.305:2028): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-10.244.16.30:22-139.178.89.65:51638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:31.306508 systemd[1]: Started sshd@59-10.244.16.30:22-139.178.89.65:51638.service. Aug 13 03:55:31.656000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:31.664958 kernel: audit: type=1400 audit(1755057331.656:2029): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:31.665092 kernel: audit: type=1400 audit(1755057331.663:2030): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:31.663000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:31.663000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007f4160 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:55:31.684053 kernel: audit: type=1300 audit(1755057331.663:2030): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007f4160 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:55:31.684212 kernel: audit: type=1327 audit(1755057331.663:2030): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:55:31.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:55:31.656000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024aae10 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:55:31.699654 kernel: audit: type=1300 audit(1755057331.656:2029): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024aae10 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:55:31.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:55:31.709955 kernel: audit: type=1327 audit(1755057331.656:2029): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:55:32.299000 audit[6874]: USER_ACCT pid=6874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:32.324091 kernel: audit: type=1101 audit(1755057332.299:2031): pid=6874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:32.326073 sshd[6874]: Accepted publickey for core from 139.178.89.65 port 51638 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:55:32.326000 audit[6874]: CRED_ACQ pid=6874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:32.335072 kernel: audit: type=1103 audit(1755057332.326:2032): pid=6874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:32.335625 kernel: audit: type=1006 audit(1755057332.326:2033): pid=6874 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=57 res=1 Aug 13 03:55:32.340450 sshd[6874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:55:32.326000 audit[6874]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2c796390 a2=3 a3=0 items=0 ppid=1 pid=6874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:32.326000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:32.366072 systemd-logind[1192]: New session 57 of user core. Aug 13 03:55:32.367282 systemd[1]: Started session-57.scope. Aug 13 03:55:32.376000 audit[6874]: USER_START pid=6874 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:32.379000 audit[6876]: CRED_ACQ pid=6876 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:33.420000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:33.420000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0096a2400 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:55:33.420000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:55:33.421000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:33.421000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:33.421000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c010cd1d10 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:55:33.421000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:55:33.421000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0061b29c0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:55:33.421000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:55:33.432000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:33.432000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0061b29f0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:55:33.432000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:55:33.480000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:33.480000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c003a8ab40 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:55:33.480000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:55:33.480000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:33.480000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0068b61a0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:55:33.480000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:55:33.665234 sshd[6874]: pam_unix(sshd:session): session closed for user core Aug 13 03:55:33.667000 audit[6874]: USER_END pid=6874 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:33.667000 audit[6874]: CRED_DISP pid=6874 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:33.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-10.244.16.30:22-139.178.89.65:51638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:33.671415 systemd[1]: sshd@59-10.244.16.30:22-139.178.89.65:51638.service: Deactivated successfully. Aug 13 03:55:33.677220 systemd[1]: session-57.scope: Deactivated successfully. Aug 13 03:55:33.678520 systemd-logind[1192]: Session 57 logged out. Waiting for processes to exit. Aug 13 03:55:33.682014 systemd-logind[1192]: Removed session 57. Aug 13 03:55:38.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-10.244.16.30:22-139.178.89.65:51646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:38.852170 kernel: kauditd_printk_skb: 25 callbacks suppressed Aug 13 03:55:38.856919 kernel: audit: type=1130 audit(1755057338.844:2045): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-10.244.16.30:22-139.178.89.65:51646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:38.844830 systemd[1]: Started sshd@60-10.244.16.30:22-139.178.89.65:51646.service. Aug 13 03:55:39.928000 audit[6888]: USER_ACCT pid=6888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:39.950855 kernel: audit: type=1101 audit(1755057339.928:2046): pid=6888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:39.955188 kernel: audit: type=1103 audit(1755057339.940:2047): pid=6888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:39.963564 kernel: audit: type=1006 audit(1755057339.940:2048): pid=6888 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=58 res=1 Aug 13 03:55:39.963752 kernel: audit: type=1300 audit(1755057339.940:2048): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecaf14610 a2=3 a3=0 items=0 ppid=1 pid=6888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:39.940000 audit[6888]: CRED_ACQ pid=6888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:39.940000 audit[6888]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecaf14610 a2=3 a3=0 items=0 ppid=1 pid=6888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:39.983862 kernel: audit: type=1327 audit(1755057339.940:2048): proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:39.940000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:39.985106 sshd[6888]: Accepted publickey for core from 139.178.89.65 port 51646 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:55:39.955586 sshd[6888]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:55:39.986483 systemd[1]: Started session-58.scope. Aug 13 03:55:39.989012 systemd-logind[1192]: New session 58 of user core. Aug 13 03:55:40.001000 audit[6888]: USER_START pid=6888 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:40.013113 kernel: audit: type=1105 audit(1755057340.001:2049): pid=6888 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:40.013480 kernel: audit: type=1103 audit(1755057340.010:2050): pid=6890 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:40.010000 audit[6890]: CRED_ACQ pid=6890 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:40.366000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:40.398190 kernel: audit: type=1400 audit(1755057340.366:2051): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:40.398375 kernel: audit: type=1300 audit(1755057340.366:2051): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007f51a0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:55:40.366000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007f51a0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:55:40.366000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:55:40.382000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:40.382000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007f51e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:55:40.382000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:55:40.390000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:40.390000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a99900 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:55:40.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:55:40.390000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:55:40.390000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a99920 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:55:40.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:55:41.710100 sshd[6888]: pam_unix(sshd:session): session closed for user core Aug 13 03:55:41.714000 audit[6888]: USER_END pid=6888 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:41.715000 audit[6888]: CRED_DISP pid=6888 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:41.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-10.244.16.30:22-139.178.89.65:51646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:41.727409 systemd[1]: sshd@60-10.244.16.30:22-139.178.89.65:51646.service: Deactivated successfully. Aug 13 03:55:41.730246 systemd[1]: session-58.scope: Deactivated successfully. Aug 13 03:55:41.734335 systemd-logind[1192]: Session 58 logged out. Waiting for processes to exit. Aug 13 03:55:41.753753 systemd-logind[1192]: Removed session 58. Aug 13 03:55:45.714280 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.fVzOcA.mount: Deactivated successfully. Aug 13 03:55:45.741262 systemd[1]: run-containerd-runc-k8s.io-7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099-runc.0yVkJh.mount: Deactivated successfully. Aug 13 03:55:46.179103 kernel: kauditd_printk_skb: 13 callbacks suppressed Aug 13 03:55:46.211881 kernel: audit: type=1400 audit(1755057346.164:2058): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:55:46.217532 kernel: audit: type=1300 audit(1755057346.164:2058): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011299c0 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:55:46.220462 kernel: audit: type=1327 audit(1755057346.164:2058): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:55:46.164000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:55:46.164000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011299c0 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:55:46.164000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:55:46.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-10.244.16.30:22-139.178.89.65:32906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:46.903327 kernel: audit: type=1130 audit(1755057346.883:2059): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-10.244.16.30:22-139.178.89.65:32906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:46.884030 systemd[1]: Started sshd@61-10.244.16.30:22-139.178.89.65:32906.service. Aug 13 03:55:47.904628 sshd[6962]: Accepted publickey for core from 139.178.89.65 port 32906 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:55:47.917327 kernel: audit: type=1101 audit(1755057347.902:2060): pid=6962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:47.902000 audit[6962]: USER_ACCT pid=6962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:47.929801 kernel: audit: type=1103 audit(1755057347.914:2061): pid=6962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:47.929908 kernel: audit: type=1006 audit(1755057347.915:2062): pid=6962 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=59 res=1 Aug 13 03:55:47.914000 audit[6962]: CRED_ACQ pid=6962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:47.930531 sshd[6962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:55:47.915000 audit[6962]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5476d2e0 a2=3 a3=0 items=0 ppid=1 pid=6962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:47.946014 kernel: audit: type=1300 audit(1755057347.915:2062): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5476d2e0 a2=3 a3=0 items=0 ppid=1 pid=6962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:47.946143 kernel: audit: type=1327 audit(1755057347.915:2062): proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:47.915000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:47.986821 systemd-logind[1192]: New session 59 of user core. Aug 13 03:55:47.991780 systemd[1]: Started session-59.scope. Aug 13 03:55:48.016000 audit[6962]: USER_START pid=6962 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:48.026271 kernel: audit: type=1105 audit(1755057348.016:2063): pid=6962 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:48.028000 audit[6965]: CRED_ACQ pid=6965 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:50.133166 sshd[6962]: pam_unix(sshd:session): session closed for user core Aug 13 03:55:50.137000 audit[6962]: USER_END pid=6962 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:50.138000 audit[6962]: CRED_DISP pid=6962 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:50.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-10.244.16.30:22-139.178.89.65:32906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:50.151131 systemd[1]: sshd@61-10.244.16.30:22-139.178.89.65:32906.service: Deactivated successfully. Aug 13 03:55:50.154017 systemd[1]: session-59.scope: Deactivated successfully. Aug 13 03:55:50.155182 systemd-logind[1192]: Session 59 logged out. Waiting for processes to exit. Aug 13 03:55:50.158100 systemd-logind[1192]: Removed session 59. Aug 13 03:55:52.652007 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.RO9wp3.mount: Deactivated successfully. Aug 13 03:55:55.307425 systemd[1]: Started sshd@62-10.244.16.30:22-139.178.89.65:41364.service. Aug 13 03:55:55.344138 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:55:55.349533 kernel: audit: type=1130 audit(1755057355.314:2068): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-10.244.16.30:22-139.178.89.65:41364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:55.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-10.244.16.30:22-139.178.89.65:41364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:55.470000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:55:55.478958 kernel: audit: type=1400 audit(1755057355.470:2069): avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:55:55.470000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002952160 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:55:55.501248 kernel: audit: type=1300 audit(1755057355.470:2069): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002952160 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:55:55.501407 kernel: audit: type=1327 audit(1755057355.470:2069): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:55:55.470000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:55:56.303000 audit[7018]: USER_ACCT pid=7018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:56.325644 kernel: audit: type=1101 audit(1755057356.303:2070): pid=7018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:56.325813 kernel: audit: type=1103 audit(1755057356.318:2071): pid=7018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:56.318000 audit[7018]: CRED_ACQ pid=7018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:56.331003 kernel: audit: type=1006 audit(1755057356.318:2072): pid=7018 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=60 res=1 Aug 13 03:55:56.338422 kernel: audit: type=1300 audit(1755057356.318:2072): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd33d9b3c0 a2=3 a3=0 items=0 ppid=1 pid=7018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:56.318000 audit[7018]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd33d9b3c0 a2=3 a3=0 items=0 ppid=1 pid=7018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:55:56.345703 kernel: audit: type=1327 audit(1755057356.318:2072): proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:56.318000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:55:56.345988 sshd[7018]: Accepted publickey for core from 139.178.89.65 port 41364 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:55:56.325686 sshd[7018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:55:56.392021 systemd-logind[1192]: New session 60 of user core. Aug 13 03:55:56.393989 systemd[1]: Started session-60.scope. Aug 13 03:55:56.421636 kernel: audit: type=1105 audit(1755057356.411:2073): pid=7018 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:56.411000 audit[7018]: USER_START pid=7018 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:56.422000 audit[7020]: CRED_ACQ pid=7020 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:57.691980 sshd[7018]: pam_unix(sshd:session): session closed for user core Aug 13 03:55:57.693000 audit[7018]: USER_END pid=7018 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:57.693000 audit[7018]: CRED_DISP pid=7018 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:55:57.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-10.244.16.30:22-139.178.89.65:41364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:55:57.697276 systemd[1]: sshd@62-10.244.16.30:22-139.178.89.65:41364.service: Deactivated successfully. Aug 13 03:55:57.699405 systemd[1]: session-60.scope: Deactivated successfully. Aug 13 03:55:57.701571 systemd-logind[1192]: Session 60 logged out. Waiting for processes to exit. Aug 13 03:55:57.704224 systemd-logind[1192]: Removed session 60. Aug 13 03:56:02.910074 systemd[1]: Started sshd@63-10.244.16.30:22-139.178.89.65:33664.service. Aug 13 03:56:02.932034 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:56:02.940128 kernel: audit: type=1130 audit(1755057362.909:2078): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-10.244.16.30:22-139.178.89.65:33664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:02.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-10.244.16.30:22-139.178.89.65:33664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:04.008000 audit[7030]: USER_ACCT pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:04.043598 kernel: audit: type=1101 audit(1755057364.008:2079): pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:04.044159 kernel: audit: type=1103 audit(1755057364.020:2080): pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:04.044465 kernel: audit: type=1006 audit(1755057364.020:2081): pid=7030 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=61 res=1 Aug 13 03:56:04.044891 kernel: audit: type=1300 audit(1755057364.020:2081): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7865bea0 a2=3 a3=0 items=0 ppid=1 pid=7030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:04.044986 kernel: audit: type=1327 audit(1755057364.020:2081): proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:04.020000 audit[7030]: CRED_ACQ pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:04.020000 audit[7030]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7865bea0 a2=3 a3=0 items=0 ppid=1 pid=7030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:04.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:04.068313 sshd[7030]: Accepted publickey for core from 139.178.89.65 port 33664 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:56:04.045115 sshd[7030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:56:04.076833 systemd-logind[1192]: New session 61 of user core. Aug 13 03:56:04.079790 systemd[1]: Started session-61.scope. Aug 13 03:56:04.091000 audit[7030]: USER_START pid=7030 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:04.101151 kernel: audit: type=1105 audit(1755057364.091:2082): pid=7030 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:04.102000 audit[7032]: CRED_ACQ pid=7032 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:04.113320 kernel: audit: type=1103 audit(1755057364.102:2083): pid=7032 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:06.245592 sshd[7030]: pam_unix(sshd:session): session closed for user core Aug 13 03:56:06.247000 audit[7030]: USER_END pid=7030 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:06.247000 audit[7030]: CRED_DISP pid=7030 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:06.265894 kernel: audit: type=1106 audit(1755057366.247:2084): pid=7030 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:06.269980 kernel: audit: type=1104 audit(1755057366.247:2085): pid=7030 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:06.276148 systemd[1]: sshd@63-10.244.16.30:22-139.178.89.65:33664.service: Deactivated successfully. Aug 13 03:56:06.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-10.244.16.30:22-139.178.89.65:33664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:06.279829 systemd[1]: session-61.scope: Deactivated successfully. Aug 13 03:56:06.283382 systemd-logind[1192]: Session 61 logged out. Waiting for processes to exit. Aug 13 03:56:06.289311 systemd-logind[1192]: Removed session 61. Aug 13 03:56:11.422967 systemd[1]: Started sshd@64-10.244.16.30:22-139.178.89.65:53346.service. Aug 13 03:56:11.441747 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:56:11.446903 kernel: audit: type=1130 audit(1755057371.425:2087): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-10.244.16.30:22-139.178.89.65:53346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:11.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-10.244.16.30:22-139.178.89.65:53346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:12.463000 audit[7041]: USER_ACCT pid=7041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:12.475772 kernel: audit: type=1101 audit(1755057372.463:2088): pid=7041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:12.482735 kernel: audit: type=1103 audit(1755057372.471:2089): pid=7041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:12.482987 kernel: audit: type=1006 audit(1755057372.472:2090): pid=7041 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=62 res=1 Aug 13 03:56:12.471000 audit[7041]: CRED_ACQ pid=7041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:12.485816 kernel: audit: type=1300 audit(1755057372.472:2090): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3bb5a2d0 a2=3 a3=0 items=0 ppid=1 pid=7041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:12.472000 audit[7041]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3bb5a2d0 a2=3 a3=0 items=0 ppid=1 pid=7041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:12.496539 kernel: audit: type=1327 audit(1755057372.472:2090): proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:12.472000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:12.496888 sshd[7041]: Accepted publickey for core from 139.178.89.65 port 53346 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:56:12.498115 sshd[7041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:56:12.530859 systemd[1]: Started session-62.scope. Aug 13 03:56:12.531146 systemd-logind[1192]: New session 62 of user core. Aug 13 03:56:12.566671 kernel: audit: type=1105 audit(1755057372.540:2091): pid=7041 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:12.540000 audit[7041]: USER_START pid=7041 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:12.566000 audit[7043]: CRED_ACQ pid=7043 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:12.577042 kernel: audit: type=1103 audit(1755057372.566:2092): pid=7043 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:13.967152 sshd[7041]: pam_unix(sshd:session): session closed for user core Aug 13 03:56:13.973000 audit[7041]: USER_END pid=7041 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:13.984974 kernel: audit: type=1106 audit(1755057373.973:2093): pid=7041 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:13.978000 audit[7041]: CRED_DISP pid=7041 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:13.994977 kernel: audit: type=1104 audit(1755057373.978:2094): pid=7041 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:14.008314 systemd[1]: sshd@64-10.244.16.30:22-139.178.89.65:53346.service: Deactivated successfully. Aug 13 03:56:14.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-10.244.16.30:22-139.178.89.65:53346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:14.014198 systemd[1]: session-62.scope: Deactivated successfully. Aug 13 03:56:14.016792 systemd-logind[1192]: Session 62 logged out. Waiting for processes to exit. Aug 13 03:56:14.019002 systemd-logind[1192]: Removed session 62. Aug 13 03:56:15.716840 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.oJM8uv.mount: Deactivated successfully. Aug 13 03:56:19.153096 systemd[1]: Started sshd@65-10.244.16.30:22-139.178.89.65:44090.service. Aug 13 03:56:19.173312 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:56:19.185908 kernel: audit: type=1130 audit(1755057379.155:2096): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-10.244.16.30:22-139.178.89.65:44090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:19.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-10.244.16.30:22-139.178.89.65:44090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:20.205000 audit[7102]: USER_ACCT pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:20.222188 kernel: audit: type=1101 audit(1755057380.205:2097): pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:20.224815 sshd[7102]: Accepted publickey for core from 139.178.89.65 port 44090 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:56:20.230000 audit[7102]: CRED_ACQ pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:20.237053 sshd[7102]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:56:20.240452 kernel: audit: type=1103 audit(1755057380.230:2098): pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:20.240777 kernel: audit: type=1006 audit(1755057380.230:2099): pid=7102 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=63 res=1 Aug 13 03:56:20.230000 audit[7102]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcef58fd30 a2=3 a3=0 items=0 ppid=1 pid=7102 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:20.260018 kernel: audit: type=1300 audit(1755057380.230:2099): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcef58fd30 a2=3 a3=0 items=0 ppid=1 pid=7102 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:20.260173 kernel: audit: type=1327 audit(1755057380.230:2099): proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:20.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:20.281427 systemd-logind[1192]: New session 63 of user core. Aug 13 03:56:20.282582 systemd[1]: Started session-63.scope. Aug 13 03:56:20.295000 audit[7102]: USER_START pid=7102 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:20.305537 kernel: audit: type=1105 audit(1755057380.295:2100): pid=7102 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:20.304000 audit[7104]: CRED_ACQ pid=7104 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:20.313130 kernel: audit: type=1103 audit(1755057380.304:2101): pid=7104 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:23.209955 sshd[7102]: pam_unix(sshd:session): session closed for user core Aug 13 03:56:23.277169 kernel: audit: type=1106 audit(1755057383.250:2102): pid=7102 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:23.278076 kernel: audit: type=1104 audit(1755057383.262:2103): pid=7102 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:23.250000 audit[7102]: USER_END pid=7102 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:23.262000 audit[7102]: CRED_DISP pid=7102 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:23.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-10.244.16.30:22-139.178.89.65:44090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:23.278384 systemd[1]: sshd@65-10.244.16.30:22-139.178.89.65:44090.service: Deactivated successfully. Aug 13 03:56:23.284694 systemd[1]: session-63.scope: Deactivated successfully. Aug 13 03:56:23.286958 systemd-logind[1192]: Session 63 logged out. Waiting for processes to exit. Aug 13 03:56:23.298588 systemd-logind[1192]: Removed session 63. Aug 13 03:56:28.375894 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:56:28.384771 kernel: audit: type=1130 audit(1755057388.362:2105): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-10.244.16.30:22-139.178.89.65:44092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:28.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-10.244.16.30:22-139.178.89.65:44092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:28.362986 systemd[1]: Started sshd@66-10.244.16.30:22-139.178.89.65:44092.service. Aug 13 03:56:29.395000 audit[7143]: USER_ACCT pid=7143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:29.416378 kernel: audit: type=1101 audit(1755057389.395:2106): pid=7143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:29.417202 kernel: audit: type=1103 audit(1755057389.405:2107): pid=7143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:29.405000 audit[7143]: CRED_ACQ pid=7143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:29.418154 sshd[7143]: Accepted publickey for core from 139.178.89.65 port 44092 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:56:29.410661 sshd[7143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:56:29.405000 audit[7143]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6e03d840 a2=3 a3=0 items=0 ppid=1 pid=7143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:29.433964 kernel: audit: type=1006 audit(1755057389.405:2108): pid=7143 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=64 res=1 Aug 13 03:56:29.434096 kernel: audit: type=1300 audit(1755057389.405:2108): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6e03d840 a2=3 a3=0 items=0 ppid=1 pid=7143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:29.434871 kernel: audit: type=1327 audit(1755057389.405:2108): proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:29.405000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:29.441040 systemd-logind[1192]: New session 64 of user core. Aug 13 03:56:29.443468 systemd[1]: Started session-64.scope. Aug 13 03:56:29.456000 audit[7143]: USER_START pid=7143 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:29.465975 kernel: audit: type=1105 audit(1755057389.456:2109): pid=7143 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:29.466000 audit[7145]: CRED_ACQ pid=7145 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:29.474601 kernel: audit: type=1103 audit(1755057389.466:2110): pid=7145 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:30.927846 sshd[7143]: pam_unix(sshd:session): session closed for user core Aug 13 03:56:30.932000 audit[7143]: USER_END pid=7143 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:30.945240 kernel: audit: type=1106 audit(1755057390.932:2111): pid=7143 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:30.932000 audit[7143]: CRED_DISP pid=7143 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:30.955952 kernel: audit: type=1104 audit(1755057390.932:2112): pid=7143 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:30.955317 systemd[1]: sshd@66-10.244.16.30:22-139.178.89.65:44092.service: Deactivated successfully. Aug 13 03:56:30.958387 systemd[1]: session-64.scope: Deactivated successfully. Aug 13 03:56:30.959506 systemd-logind[1192]: Session 64 logged out. Waiting for processes to exit. Aug 13 03:56:30.961694 systemd-logind[1192]: Removed session 64. Aug 13 03:56:30.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-10.244.16.30:22-139.178.89.65:44092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:31.675000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:31.675000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001925d00 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:56:31.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:56:31.676000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:31.676000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ef2150 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:56:31.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:56:33.442104 kernel: kauditd_printk_skb: 7 callbacks suppressed Aug 13 03:56:33.446572 kernel: audit: type=1400 audit(1755057393.436:2117): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.436000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.436000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.454885 kernel: audit: type=1400 audit(1755057393.436:2116): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.456213 kernel: audit: type=1300 audit(1755057393.436:2116): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0057e07e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:56:33.436000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0057e07e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:56:33.436000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:56:33.470325 kernel: audit: type=1327 audit(1755057393.436:2116): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:56:33.470533 kernel: audit: type=1400 audit(1755057393.437:2118): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.437000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.437000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0103cf680 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:56:33.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:56:33.492010 kernel: audit: type=1300 audit(1755057393.437:2118): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0103cf680 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:56:33.492569 kernel: audit: type=1327 audit(1755057393.437:2118): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:56:33.436000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00637a8a0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:56:33.436000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:56:33.519318 kernel: audit: type=1300 audit(1755057393.436:2117): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00637a8a0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:56:33.519487 kernel: audit: type=1327 audit(1755057393.436:2117): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:56:33.519552 kernel: audit: type=1400 audit(1755057393.458:2119): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.458000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.458000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00637a9f0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:56:33.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:56:33.476000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.476000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0057e1b60 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:56:33.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:56:33.476000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:33.476000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00fb6cae0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:56:33.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:56:36.093287 systemd[1]: Started sshd@67-10.244.16.30:22-139.178.89.65:38146.service. Aug 13 03:56:36.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-10.244.16.30:22-139.178.89.65:38146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:37.117000 audit[7156]: USER_ACCT pid=7156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:37.119000 audit[7156]: CRED_ACQ pid=7156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:37.119000 audit[7156]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc05179490 a2=3 a3=0 items=0 ppid=1 pid=7156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:37.119000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:37.124450 sshd[7156]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:56:37.153556 sshd[7156]: Accepted publickey for core from 139.178.89.65 port 38146 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:56:37.158486 systemd[1]: Started session-65.scope. Aug 13 03:56:37.160563 systemd-logind[1192]: New session 65 of user core. Aug 13 03:56:37.170000 audit[7156]: USER_START pid=7156 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:37.173000 audit[7171]: CRED_ACQ pid=7171 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:39.415554 sshd[7156]: pam_unix(sshd:session): session closed for user core Aug 13 03:56:39.452605 kernel: kauditd_printk_skb: 16 callbacks suppressed Aug 13 03:56:39.457225 kernel: audit: type=1106 audit(1755057399.440:2128): pid=7156 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:39.440000 audit[7156]: USER_END pid=7156 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:39.470781 kernel: audit: type=1104 audit(1755057399.456:2129): pid=7156 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:39.456000 audit[7156]: CRED_DISP pid=7156 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:39.473548 systemd[1]: sshd@67-10.244.16.30:22-139.178.89.65:38146.service: Deactivated successfully. Aug 13 03:56:39.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-10.244.16.30:22-139.178.89.65:38146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:39.482409 kernel: audit: type=1131 audit(1755057399.474:2130): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-10.244.16.30:22-139.178.89.65:38146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:39.486342 systemd[1]: session-65.scope: Deactivated successfully. Aug 13 03:56:39.489438 systemd-logind[1192]: Session 65 logged out. Waiting for processes to exit. Aug 13 03:56:39.491162 systemd-logind[1192]: Removed session 65. Aug 13 03:56:40.394000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:40.405977 kernel: audit: type=1400 audit(1755057400.394:2131): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:40.394000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002876e00 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:56:40.418959 kernel: audit: type=1300 audit(1755057400.394:2131): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002876e00 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:56:40.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:56:40.429949 kernel: audit: type=1327 audit(1755057400.394:2131): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:56:40.403000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:40.403000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00177e8e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:56:40.445657 kernel: audit: type=1400 audit(1755057400.403:2132): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:40.446293 kernel: audit: type=1300 audit(1755057400.403:2132): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00177e8e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:56:40.403000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:56:40.470963 kernel: audit: type=1327 audit(1755057400.403:2132): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:56:40.409000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:40.409000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002876e20 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:56:40.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:56:40.421000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:40.484061 kernel: audit: type=1400 audit(1755057400.409:2133): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:56:40.421000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002876e40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:56:40.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:56:44.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-10.244.16.30:22-139.178.89.65:60354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:44.610333 kernel: kauditd_printk_skb: 5 callbacks suppressed Aug 13 03:56:44.612344 kernel: audit: type=1130 audit(1755057404.579:2135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-10.244.16.30:22-139.178.89.65:60354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:44.579473 systemd[1]: Started sshd@68-10.244.16.30:22-139.178.89.65:60354.service. Aug 13 03:56:45.627804 systemd[1]: run-containerd-runc-k8s.io-7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099-runc.B8CueN.mount: Deactivated successfully. Aug 13 03:56:45.698141 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.Am56CN.mount: Deactivated successfully. Aug 13 03:56:45.733000 audit[7204]: USER_ACCT pid=7204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:45.745622 kernel: audit: type=1101 audit(1755057405.733:2136): pid=7204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:45.745793 sshd[7204]: Accepted publickey for core from 139.178.89.65 port 60354 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:56:45.770000 audit[7204]: CRED_ACQ pid=7204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:45.779167 kernel: audit: type=1103 audit(1755057405.770:2137): pid=7204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:45.783963 kernel: audit: type=1006 audit(1755057405.771:2138): pid=7204 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=66 res=1 Aug 13 03:56:45.784489 sshd[7204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:56:45.771000 audit[7204]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c68d900 a2=3 a3=0 items=0 ppid=1 pid=7204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:45.821546 kernel: audit: type=1300 audit(1755057405.771:2138): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c68d900 a2=3 a3=0 items=0 ppid=1 pid=7204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:45.821719 kernel: audit: type=1327 audit(1755057405.771:2138): proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:45.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:45.856147 systemd-logind[1192]: New session 66 of user core. Aug 13 03:56:45.857546 systemd[1]: Started session-66.scope. Aug 13 03:56:45.872000 audit[7204]: USER_START pid=7204 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:45.882073 kernel: audit: type=1105 audit(1755057405.872:2139): pid=7204 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:45.881000 audit[7241]: CRED_ACQ pid=7241 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:45.891959 kernel: audit: type=1103 audit(1755057405.881:2140): pid=7241 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:46.350000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:56:46.373776 kernel: audit: type=1400 audit(1755057406.350:2141): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:56:46.373910 kernel: audit: type=1300 audit(1755057406.350:2141): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cd0180 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:56:46.350000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cd0180 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:56:46.350000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:56:47.876076 sshd[7204]: pam_unix(sshd:session): session closed for user core Aug 13 03:56:47.940000 audit[7204]: USER_END pid=7204 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:47.942000 audit[7204]: CRED_DISP pid=7204 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:47.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-10.244.16.30:22-139.178.89.65:60354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:47.950143 systemd[1]: sshd@68-10.244.16.30:22-139.178.89.65:60354.service: Deactivated successfully. Aug 13 03:56:47.973479 systemd[1]: session-66.scope: Deactivated successfully. Aug 13 03:56:47.976793 systemd-logind[1192]: Session 66 logged out. Waiting for processes to exit. Aug 13 03:56:47.985203 systemd-logind[1192]: Removed session 66. Aug 13 03:56:53.019440 systemd[1]: Started sshd@69-10.244.16.30:22-139.178.89.65:48122.service. Aug 13 03:56:53.069611 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:56:53.072898 kernel: audit: type=1130 audit(1755057413.022:2145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-10.244.16.30:22-139.178.89.65:48122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:53.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-10.244.16.30:22-139.178.89.65:48122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:54.026000 audit[7297]: USER_ACCT pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:54.053300 kernel: audit: type=1101 audit(1755057414.026:2146): pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:54.053474 kernel: audit: type=1103 audit(1755057414.038:2147): pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:54.054005 kernel: audit: type=1006 audit(1755057414.038:2148): pid=7297 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=67 res=1 Aug 13 03:56:54.038000 audit[7297]: CRED_ACQ pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:54.054753 sshd[7297]: Accepted publickey for core from 139.178.89.65 port 48122 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:56:54.074632 kernel: audit: type=1300 audit(1755057414.038:2148): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4e5a1e20 a2=3 a3=0 items=0 ppid=1 pid=7297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:54.074801 kernel: audit: type=1327 audit(1755057414.038:2148): proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:54.038000 audit[7297]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4e5a1e20 a2=3 a3=0 items=0 ppid=1 pid=7297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:56:54.038000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:56:54.044443 sshd[7297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:56:54.162599 systemd-logind[1192]: New session 67 of user core. Aug 13 03:56:54.168398 systemd[1]: Started session-67.scope. Aug 13 03:56:54.184000 audit[7297]: USER_START pid=7297 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:54.196436 kernel: audit: type=1105 audit(1755057414.184:2149): pid=7297 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:54.187000 audit[7299]: CRED_ACQ pid=7299 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:54.206980 kernel: audit: type=1103 audit(1755057414.187:2150): pid=7299 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:55.479000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:56:55.534449 kernel: audit: type=1400 audit(1755057415.479:2151): avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:56:55.534637 kernel: audit: type=1300 audit(1755057415.479:2151): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000589540 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:56:55.479000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000589540 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:56:55.479000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:56:57.892692 sshd[7297]: pam_unix(sshd:session): session closed for user core Aug 13 03:56:57.944000 audit[7297]: USER_END pid=7297 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:57.945000 audit[7297]: CRED_DISP pid=7297 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:56:57.970466 systemd[1]: sshd@69-10.244.16.30:22-139.178.89.65:48122.service: Deactivated successfully. Aug 13 03:56:57.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-10.244.16.30:22-139.178.89.65:48122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:57.976045 systemd[1]: session-67.scope: Deactivated successfully. Aug 13 03:56:57.981360 systemd-logind[1192]: Session 67 logged out. Waiting for processes to exit. Aug 13 03:56:57.990149 systemd-logind[1192]: Removed session 67. Aug 13 03:56:59.306463 systemd[1]: Started sshd@70-10.244.16.30:22-176.65.148.235:36016.service. Aug 13 03:56:59.317777 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:56:59.330580 kernel: audit: type=1130 audit(1755057419.305:2155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-10.244.16.30:22-176.65.148.235:36016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:56:59.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-10.244.16.30:22-176.65.148.235:36016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:02.109120 sshd[7315]: kex_exchange_identification: read: Connection reset by peer Aug 13 03:57:02.145548 kernel: audit: type=1131 audit(1755057422.124:2156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-10.244.16.30:22-176.65.148.235:36016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:02.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-10.244.16.30:22-176.65.148.235:36016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:02.154772 sshd[7315]: Connection reset by 176.65.148.235 port 36016 Aug 13 03:57:02.118425 systemd[1]: sshd@70-10.244.16.30:22-176.65.148.235:36016.service: Deactivated successfully. Aug 13 03:57:03.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-10.244.16.30:22-139.178.89.65:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:03.064796 kernel: audit: type=1130 audit(1755057423.050:2157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-10.244.16.30:22-139.178.89.65:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:03.051375 systemd[1]: Started sshd@71-10.244.16.30:22-139.178.89.65:39900.service. Aug 13 03:57:04.047000 audit[7320]: USER_ACCT pid=7320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:04.084052 kernel: audit: type=1101 audit(1755057424.047:2158): pid=7320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:04.084187 kernel: audit: type=1103 audit(1755057424.059:2159): pid=7320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:04.084618 kernel: audit: type=1006 audit(1755057424.059:2160): pid=7320 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=68 res=1 Aug 13 03:57:04.085347 kernel: audit: type=1300 audit(1755057424.059:2160): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc03c73a80 a2=3 a3=0 items=0 ppid=1 pid=7320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:04.085915 kernel: audit: type=1327 audit(1755057424.059:2160): proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:04.059000 audit[7320]: CRED_ACQ pid=7320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:04.059000 audit[7320]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc03c73a80 a2=3 a3=0 items=0 ppid=1 pid=7320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:04.059000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:04.097542 sshd[7320]: Accepted publickey for core from 139.178.89.65 port 39900 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:57:04.079334 sshd[7320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:57:04.132144 systemd-logind[1192]: New session 68 of user core. Aug 13 03:57:04.138946 systemd[1]: Started session-68.scope. Aug 13 03:57:04.148000 audit[7320]: USER_START pid=7320 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:04.151000 audit[7322]: CRED_ACQ pid=7322 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:04.163429 kernel: audit: type=1105 audit(1755057424.148:2161): pid=7320 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:04.163615 kernel: audit: type=1103 audit(1755057424.151:2162): pid=7322 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:05.966231 sshd[7320]: pam_unix(sshd:session): session closed for user core Aug 13 03:57:06.013715 kernel: audit: type=1106 audit(1755057425.992:2163): pid=7320 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:05.992000 audit[7320]: USER_END pid=7320 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:06.040049 kernel: audit: type=1104 audit(1755057425.999:2164): pid=7320 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:06.040697 kernel: audit: type=1131 audit(1755057426.017:2165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-10.244.16.30:22-139.178.89.65:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:05.999000 audit[7320]: CRED_DISP pid=7320 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:06.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-10.244.16.30:22-139.178.89.65:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:06.015503 systemd[1]: sshd@71-10.244.16.30:22-139.178.89.65:39900.service: Deactivated successfully. Aug 13 03:57:06.023723 systemd[1]: session-68.scope: Deactivated successfully. Aug 13 03:57:06.026019 systemd-logind[1192]: Session 68 logged out. Waiting for processes to exit. Aug 13 03:57:06.034678 systemd-logind[1192]: Removed session 68. Aug 13 03:57:11.132496 systemd[1]: Started sshd@72-10.244.16.30:22-139.178.89.65:33360.service. Aug 13 03:57:11.179735 kernel: audit: type=1130 audit(1755057431.134:2166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-10.244.16.30:22-139.178.89.65:33360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:11.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-10.244.16.30:22-139.178.89.65:33360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:12.119373 sshd[7332]: Accepted publickey for core from 139.178.89.65 port 33360 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:57:12.135007 kernel: audit: type=1101 audit(1755057432.116:2167): pid=7332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:12.116000 audit[7332]: USER_ACCT pid=7332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:12.169828 kernel: audit: type=1103 audit(1755057432.130:2168): pid=7332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:12.169999 kernel: audit: type=1006 audit(1755057432.131:2169): pid=7332 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=69 res=1 Aug 13 03:57:12.170059 kernel: audit: type=1300 audit(1755057432.131:2169): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd036bec60 a2=3 a3=0 items=0 ppid=1 pid=7332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:12.170110 kernel: audit: type=1327 audit(1755057432.131:2169): proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:12.130000 audit[7332]: CRED_ACQ pid=7332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:12.131000 audit[7332]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd036bec60 a2=3 a3=0 items=0 ppid=1 pid=7332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:12.131000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:12.134895 sshd[7332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:57:12.194167 systemd-logind[1192]: New session 69 of user core. Aug 13 03:57:12.205577 systemd[1]: Started session-69.scope. Aug 13 03:57:12.219000 audit[7332]: USER_START pid=7332 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:12.228968 kernel: audit: type=1105 audit(1755057432.219:2170): pid=7332 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:12.219000 audit[7334]: CRED_ACQ pid=7334 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:12.236038 kernel: audit: type=1103 audit(1755057432.219:2171): pid=7334 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:15.694098 sshd[7332]: pam_unix(sshd:session): session closed for user core Aug 13 03:57:15.829872 kernel: audit: type=1106 audit(1755057435.753:2172): pid=7332 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:15.831552 kernel: audit: type=1104 audit(1755057435.757:2173): pid=7332 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:15.753000 audit[7332]: USER_END pid=7332 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:15.757000 audit[7332]: CRED_DISP pid=7332 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:15.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-10.244.16.30:22-139.178.89.65:33360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:15.798371 systemd[1]: sshd@72-10.244.16.30:22-139.178.89.65:33360.service: Deactivated successfully. Aug 13 03:57:15.804134 systemd[1]: session-69.scope: Deactivated successfully. Aug 13 03:57:15.804371 systemd[1]: session-69.scope: Consumed 1.028s CPU time. Aug 13 03:57:15.809860 systemd-logind[1192]: Session 69 logged out. Waiting for processes to exit. Aug 13 03:57:15.822010 systemd-logind[1192]: Removed session 69. Aug 13 03:57:15.938529 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.zQQS8E.mount: Deactivated successfully. Aug 13 03:57:20.916088 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:57:20.958029 kernel: audit: type=1130 audit(1755057440.900:2175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-10.244.16.30:22-139.178.89.65:46580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:20.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-10.244.16.30:22-139.178.89.65:46580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:20.897152 systemd[1]: Started sshd@73-10.244.16.30:22-139.178.89.65:46580.service. Aug 13 03:57:21.948000 audit[7393]: USER_ACCT pid=7393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:21.976061 kernel: audit: type=1101 audit(1755057441.948:2176): pid=7393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:21.977196 kernel: audit: type=1103 audit(1755057441.972:2177): pid=7393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:21.972000 audit[7393]: CRED_ACQ pid=7393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:21.977872 sshd[7393]: Accepted publickey for core from 139.178.89.65 port 46580 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:57:21.988972 kernel: audit: type=1006 audit(1755057441.972:2178): pid=7393 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=70 res=1 Aug 13 03:57:21.984122 sshd[7393]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:57:21.972000 audit[7393]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd470ae830 a2=3 a3=0 items=0 ppid=1 pid=7393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:22.011451 kernel: audit: type=1300 audit(1755057441.972:2178): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd470ae830 a2=3 a3=0 items=0 ppid=1 pid=7393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:22.012045 kernel: audit: type=1327 audit(1755057441.972:2178): proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:21.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:22.076116 systemd-logind[1192]: New session 70 of user core. Aug 13 03:57:22.078725 systemd[1]: Started session-70.scope. Aug 13 03:57:22.092000 audit[7393]: USER_START pid=7393 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:22.101998 kernel: audit: type=1105 audit(1755057442.092:2179): pid=7393 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:22.103577 kernel: audit: type=1103 audit(1755057442.101:2180): pid=7409 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:22.101000 audit[7409]: CRED_ACQ pid=7409 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:23.787782 sshd[7393]: pam_unix(sshd:session): session closed for user core Aug 13 03:57:23.842557 kernel: audit: type=1106 audit(1755057443.827:2181): pid=7393 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:23.827000 audit[7393]: USER_END pid=7393 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:23.843000 audit[7393]: CRED_DISP pid=7393 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:23.854018 kernel: audit: type=1104 audit(1755057443.843:2182): pid=7393 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:23.865669 systemd[1]: sshd@73-10.244.16.30:22-139.178.89.65:46580.service: Deactivated successfully. Aug 13 03:57:23.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-10.244.16.30:22-139.178.89.65:46580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:23.869509 systemd[1]: session-70.scope: Deactivated successfully. Aug 13 03:57:23.871105 systemd-logind[1192]: Session 70 logged out. Waiting for processes to exit. Aug 13 03:57:23.878281 systemd-logind[1192]: Removed session 70. Aug 13 03:57:28.955075 systemd[1]: Started sshd@74-10.244.16.30:22-139.178.89.65:46586.service. Aug 13 03:57:29.010165 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:57:29.017452 kernel: audit: type=1130 audit(1755057448.957:2184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-10.244.16.30:22-139.178.89.65:46586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:28.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-10.244.16.30:22-139.178.89.65:46586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:29.955000 audit[7420]: USER_ACCT pid=7420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:29.961314 sshd[7420]: Accepted publickey for core from 139.178.89.65 port 46586 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:57:29.966952 kernel: audit: type=1101 audit(1755057449.955:2185): pid=7420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:29.967000 audit[7420]: CRED_ACQ pid=7420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:29.977045 kernel: audit: type=1103 audit(1755057449.967:2186): pid=7420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:29.978233 sshd[7420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:57:29.984105 kernel: audit: type=1006 audit(1755057449.967:2187): pid=7420 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=71 res=1 Aug 13 03:57:29.967000 audit[7420]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4e82d300 a2=3 a3=0 items=0 ppid=1 pid=7420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:29.996593 kernel: audit: type=1300 audit(1755057449.967:2187): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4e82d300 a2=3 a3=0 items=0 ppid=1 pid=7420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:29.996675 kernel: audit: type=1327 audit(1755057449.967:2187): proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:29.967000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:30.037368 systemd-logind[1192]: New session 71 of user core. Aug 13 03:57:30.039375 systemd[1]: Started session-71.scope. Aug 13 03:57:30.053000 audit[7420]: USER_START pid=7420 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:30.062961 kernel: audit: type=1105 audit(1755057450.053:2188): pid=7420 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:30.063000 audit[7422]: CRED_ACQ pid=7422 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:30.073967 kernel: audit: type=1103 audit(1755057450.063:2189): pid=7422 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:31.717000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:31.761316 kernel: audit: type=1400 audit(1755057451.717:2190): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:31.767761 kernel: audit: type=1300 audit(1755057451.717:2190): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b5c600 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:57:31.717000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b5c600 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:57:31.717000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:57:31.718000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:31.718000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007ef080 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:57:31.718000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:57:32.628368 sshd[7420]: pam_unix(sshd:session): session closed for user core Aug 13 03:57:32.686000 audit[7420]: USER_END pid=7420 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:32.686000 audit[7420]: CRED_DISP pid=7420 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:32.704228 systemd[1]: sshd@74-10.244.16.30:22-139.178.89.65:46586.service: Deactivated successfully. Aug 13 03:57:32.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-10.244.16.30:22-139.178.89.65:46586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:32.712639 systemd[1]: session-71.scope: Deactivated successfully. Aug 13 03:57:32.715888 systemd-logind[1192]: Session 71 logged out. Waiting for processes to exit. Aug 13 03:57:32.727303 systemd-logind[1192]: Removed session 71. Aug 13 03:57:33.453000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:33.453000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00830a920 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:57:33.453000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:57:33.454000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:33.454000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0069e95c0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:57:33.454000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:57:33.459000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:33.459000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0058217d0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:57:33.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:57:33.459000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:33.459000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c005821800 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:57:33.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:57:33.491000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:33.491000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0069e97a0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:57:33.491000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:57:33.492000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:33.492000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00fe53de0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:57:33.492000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:57:37.846397 systemd[1]: Started sshd@75-10.244.16.30:22-139.178.89.65:60004.service. Aug 13 03:57:37.902352 kernel: kauditd_printk_skb: 25 callbacks suppressed Aug 13 03:57:37.906095 kernel: audit: type=1130 audit(1755057457.850:2201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-10.244.16.30:22-139.178.89.65:60004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:37.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-10.244.16.30:22-139.178.89.65:60004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:38.861000 audit[7432]: USER_ACCT pid=7432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:38.874228 kernel: audit: type=1101 audit(1755057458.861:2202): pid=7432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:38.874404 kernel: audit: type=1103 audit(1755057458.871:2203): pid=7432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:38.871000 audit[7432]: CRED_ACQ pid=7432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:38.875346 sshd[7432]: Accepted publickey for core from 139.178.89.65 port 60004 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:57:38.886057 kernel: audit: type=1006 audit(1755057458.871:2204): pid=7432 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=72 res=1 Aug 13 03:57:38.871000 audit[7432]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1ea09aa0 a2=3 a3=0 items=0 ppid=1 pid=7432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:38.901088 kernel: audit: type=1300 audit(1755057458.871:2204): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1ea09aa0 a2=3 a3=0 items=0 ppid=1 pid=7432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:38.901258 kernel: audit: type=1327 audit(1755057458.871:2204): proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:38.871000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:38.887899 sshd[7432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:57:38.955870 systemd[1]: Started session-72.scope. Aug 13 03:57:38.975000 audit[7432]: USER_START pid=7432 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:38.987140 kernel: audit: type=1105 audit(1755057458.975:2205): pid=7432 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:38.987244 kernel: audit: type=1103 audit(1755057458.984:2206): pid=7436 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:38.984000 audit[7436]: CRED_ACQ pid=7436 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:38.956546 systemd-logind[1192]: New session 72 of user core. Aug 13 03:57:40.435000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:40.465747 kernel: audit: type=1400 audit(1755057460.435:2207): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:40.466501 kernel: audit: type=1300 audit(1755057460.435:2207): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00109cd60 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:57:40.435000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00109cd60 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:57:40.435000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:57:40.450000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:40.450000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bd55a0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:57:40.450000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:57:40.461000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:40.461000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bd55c0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:57:40.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:57:40.461000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:57:40.461000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bd55e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:57:40.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:57:40.534329 sshd[7432]: pam_unix(sshd:session): session closed for user core Aug 13 03:57:40.543000 audit[7432]: USER_END pid=7432 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:40.545000 audit[7432]: CRED_DISP pid=7432 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:40.590547 systemd[1]: sshd@75-10.244.16.30:22-139.178.89.65:60004.service: Deactivated successfully. Aug 13 03:57:40.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-10.244.16.30:22-139.178.89.65:60004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:40.598847 systemd[1]: session-72.scope: Deactivated successfully. Aug 13 03:57:40.599964 systemd-logind[1192]: Session 72 logged out. Waiting for processes to exit. Aug 13 03:57:40.612939 systemd-logind[1192]: Removed session 72. Aug 13 03:57:44.557172 update_engine[1194]: I0813 03:57:44.555127 1194 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Aug 13 03:57:44.557172 update_engine[1194]: I0813 03:57:44.557417 1194 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Aug 13 03:57:44.586852 update_engine[1194]: I0813 03:57:44.563135 1194 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Aug 13 03:57:44.586852 update_engine[1194]: I0813 03:57:44.566802 1194 omaha_request_params.cc:62] Current group set to lts Aug 13 03:57:44.586852 update_engine[1194]: I0813 03:57:44.583714 1194 update_attempter.cc:499] Already updated boot flags. Skipping. Aug 13 03:57:44.586852 update_engine[1194]: I0813 03:57:44.583748 1194 update_attempter.cc:643] Scheduling an action processor start. Aug 13 03:57:44.586852 update_engine[1194]: I0813 03:57:44.583779 1194 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Aug 13 03:57:44.586852 update_engine[1194]: I0813 03:57:44.585340 1194 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Aug 13 03:57:44.586852 update_engine[1194]: I0813 03:57:44.585484 1194 omaha_request_action.cc:270] Posting an Omaha request to disabled Aug 13 03:57:44.586852 update_engine[1194]: I0813 03:57:44.585495 1194 omaha_request_action.cc:271] Request: Aug 13 03:57:44.586852 update_engine[1194]: Aug 13 03:57:44.586852 update_engine[1194]: Aug 13 03:57:44.586852 update_engine[1194]: Aug 13 03:57:44.586852 update_engine[1194]: Aug 13 03:57:44.586852 update_engine[1194]: Aug 13 03:57:44.586852 update_engine[1194]: Aug 13 03:57:44.586852 update_engine[1194]: Aug 13 03:57:44.586852 update_engine[1194]: Aug 13 03:57:44.586852 update_engine[1194]: I0813 03:57:44.585505 1194 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Aug 13 03:57:44.629421 update_engine[1194]: I0813 03:57:44.629058 1194 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Aug 13 03:57:44.630426 update_engine[1194]: I0813 03:57:44.630362 1194 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Aug 13 03:57:44.641144 update_engine[1194]: E0813 03:57:44.640892 1194 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Aug 13 03:57:44.641144 update_engine[1194]: I0813 03:57:44.641096 1194 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Aug 13 03:57:44.645678 locksmithd[1234]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Aug 13 03:57:45.653196 systemd[1]: run-containerd-runc-k8s.io-7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099-runc.9jZpz3.mount: Deactivated successfully. Aug 13 03:57:45.698468 systemd[1]: Started sshd@76-10.244.16.30:22-139.178.89.65:45578.service. Aug 13 03:57:45.711509 kernel: kauditd_printk_skb: 13 callbacks suppressed Aug 13 03:57:45.715763 kernel: audit: type=1130 audit(1755057465.700:2214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-10.244.16.30:22-139.178.89.65:45578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:45.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-10.244.16.30:22-139.178.89.65:45578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:45.761142 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.ZTBbTR.mount: Deactivated successfully. Aug 13 03:57:46.398000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:57:46.431585 kernel: audit: type=1400 audit(1755057466.398:2215): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:57:46.431951 kernel: audit: type=1300 audit(1755057466.398:2215): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00241d980 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:57:46.432044 kernel: audit: type=1327 audit(1755057466.398:2215): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:57:46.398000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00241d980 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:57:46.398000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:57:46.745071 kernel: audit: type=1101 audit(1755057466.736:2216): pid=7494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:46.736000 audit[7494]: USER_ACCT pid=7494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:46.780120 kernel: audit: type=1103 audit(1755057466.755:2217): pid=7494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:46.781630 kernel: audit: type=1006 audit(1755057466.756:2218): pid=7494 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=73 res=1 Aug 13 03:57:46.798806 kernel: audit: type=1300 audit(1755057466.756:2218): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec6cf0d50 a2=3 a3=0 items=0 ppid=1 pid=7494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:46.755000 audit[7494]: CRED_ACQ pid=7494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:46.804942 kernel: audit: type=1327 audit(1755057466.756:2218): proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:46.756000 audit[7494]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec6cf0d50 a2=3 a3=0 items=0 ppid=1 pid=7494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:46.756000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:46.820356 sshd[7494]: Accepted publickey for core from 139.178.89.65 port 45578 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:57:46.775840 sshd[7494]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:57:46.863360 systemd-logind[1192]: New session 73 of user core. Aug 13 03:57:46.865721 systemd[1]: Started session-73.scope. Aug 13 03:57:46.894262 kernel: audit: type=1105 audit(1755057466.881:2219): pid=7494 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:46.881000 audit[7494]: USER_START pid=7494 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:46.893000 audit[7510]: CRED_ACQ pid=7510 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:49.001256 sshd[7494]: pam_unix(sshd:session): session closed for user core Aug 13 03:57:49.063000 audit[7494]: USER_END pid=7494 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:49.065000 audit[7494]: CRED_DISP pid=7494 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:49.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-10.244.16.30:22-139.178.89.65:45578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:49.088671 systemd[1]: sshd@76-10.244.16.30:22-139.178.89.65:45578.service: Deactivated successfully. Aug 13 03:57:49.096622 systemd[1]: session-73.scope: Deactivated successfully. Aug 13 03:57:49.102430 systemd-logind[1192]: Session 73 logged out. Waiting for processes to exit. Aug 13 03:57:49.111866 systemd-logind[1192]: Removed session 73. Aug 13 03:57:54.206918 systemd[1]: Started sshd@77-10.244.16.30:22-139.178.89.65:47238.service. Aug 13 03:57:54.308395 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:57:54.311253 kernel: audit: type=1130 audit(1755057474.208:2224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-10.244.16.30:22-139.178.89.65:47238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:54.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-10.244.16.30:22-139.178.89.65:47238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:54.561093 update_engine[1194]: I0813 03:57:54.558501 1194 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Aug 13 03:57:54.571853 update_engine[1194]: I0813 03:57:54.571491 1194 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Aug 13 03:57:54.573551 update_engine[1194]: I0813 03:57:54.573473 1194 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Aug 13 03:57:54.574955 update_engine[1194]: E0813 03:57:54.574767 1194 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Aug 13 03:57:54.574955 update_engine[1194]: I0813 03:57:54.574893 1194 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Aug 13 03:57:55.296000 audit[7561]: USER_ACCT pid=7561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:55.350825 kernel: audit: type=1101 audit(1755057475.296:2225): pid=7561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:55.354228 kernel: audit: type=1103 audit(1755057475.304:2226): pid=7561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:55.355320 kernel: audit: type=1006 audit(1755057475.304:2227): pid=7561 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=74 res=1 Aug 13 03:57:55.356194 kernel: audit: type=1300 audit(1755057475.304:2227): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdceaff3d0 a2=3 a3=0 items=0 ppid=1 pid=7561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:55.356892 kernel: audit: type=1327 audit(1755057475.304:2227): proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:55.304000 audit[7561]: CRED_ACQ pid=7561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:55.304000 audit[7561]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdceaff3d0 a2=3 a3=0 items=0 ppid=1 pid=7561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:57:55.304000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:57:55.376262 sshd[7561]: Accepted publickey for core from 139.178.89.65 port 47238 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:57:55.307503 sshd[7561]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:57:55.371475 systemd-logind[1192]: New session 74 of user core. Aug 13 03:57:55.374529 systemd[1]: Started session-74.scope. Aug 13 03:57:55.397000 audit[7561]: USER_START pid=7561 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:55.407853 kernel: audit: type=1105 audit(1755057475.397:2228): pid=7561 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:55.408734 kernel: audit: type=1103 audit(1755057475.406:2229): pid=7563 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:55.406000 audit[7563]: CRED_ACQ pid=7563 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:55.500000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:57:55.500000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005889e0 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:57:55.517222 kernel: audit: type=1400 audit(1755057475.500:2230): avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:57:55.517378 kernel: audit: type=1300 audit(1755057475.500:2230): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005889e0 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:57:55.500000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:57:57.686724 sshd[7561]: pam_unix(sshd:session): session closed for user core Aug 13 03:57:57.784000 audit[7561]: USER_END pid=7561 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:57.785000 audit[7561]: CRED_DISP pid=7561 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:57:57.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-10.244.16.30:22-139.178.89.65:47238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:57:57.816130 systemd[1]: sshd@77-10.244.16.30:22-139.178.89.65:47238.service: Deactivated successfully. Aug 13 03:57:57.829382 systemd[1]: session-74.scope: Deactivated successfully. Aug 13 03:57:57.834067 systemd-logind[1192]: Session 74 logged out. Waiting for processes to exit. Aug 13 03:57:57.845427 systemd-logind[1192]: Removed session 74. Aug 13 03:58:02.957808 kernel: kauditd_printk_skb: 4 callbacks suppressed Aug 13 03:58:02.983800 kernel: audit: type=1130 audit(1755057482.938:2234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-10.244.16.30:22-139.178.89.65:39122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:02.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-10.244.16.30:22-139.178.89.65:39122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:02.939289 systemd[1]: Started sshd@78-10.244.16.30:22-139.178.89.65:39122.service. Aug 13 03:58:04.008000 audit[7580]: USER_ACCT pid=7580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:04.018330 sshd[7580]: Accepted publickey for core from 139.178.89.65 port 39122 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:58:04.025069 kernel: audit: type=1101 audit(1755057484.008:2235): pid=7580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:04.042000 audit[7580]: CRED_ACQ pid=7580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:04.046217 sshd[7580]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:58:04.055723 kernel: audit: type=1103 audit(1755057484.042:2236): pid=7580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:04.055861 kernel: audit: type=1006 audit(1755057484.042:2237): pid=7580 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=75 res=1 Aug 13 03:58:04.042000 audit[7580]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefe38ab40 a2=3 a3=0 items=0 ppid=1 pid=7580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:04.076375 kernel: audit: type=1300 audit(1755057484.042:2237): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefe38ab40 a2=3 a3=0 items=0 ppid=1 pid=7580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:04.076525 kernel: audit: type=1327 audit(1755057484.042:2237): proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:04.042000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:04.126135 systemd-logind[1192]: New session 75 of user core. Aug 13 03:58:04.128690 systemd[1]: Started session-75.scope. Aug 13 03:58:04.140000 audit[7580]: USER_START pid=7580 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:04.149263 kernel: audit: type=1105 audit(1755057484.140:2238): pid=7580 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:04.149000 audit[7582]: CRED_ACQ pid=7582 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:04.157040 kernel: audit: type=1103 audit(1755057484.149:2239): pid=7582 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:04.551981 update_engine[1194]: I0813 03:58:04.549733 1194 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Aug 13 03:58:04.563800 update_engine[1194]: I0813 03:58:04.563560 1194 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Aug 13 03:58:04.564385 update_engine[1194]: I0813 03:58:04.564320 1194 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Aug 13 03:58:04.565146 update_engine[1194]: E0813 03:58:04.564898 1194 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Aug 13 03:58:04.565146 update_engine[1194]: I0813 03:58:04.565105 1194 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Aug 13 03:58:05.502594 sshd[7580]: pam_unix(sshd:session): session closed for user core Aug 13 03:58:05.526376 kernel: audit: type=1106 audit(1755057485.504:2240): pid=7580 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:05.527800 kernel: audit: type=1104 audit(1755057485.504:2241): pid=7580 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:05.504000 audit[7580]: USER_END pid=7580 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:05.504000 audit[7580]: CRED_DISP pid=7580 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:05.536630 systemd[1]: sshd@78-10.244.16.30:22-139.178.89.65:39122.service: Deactivated successfully. Aug 13 03:58:05.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-10.244.16.30:22-139.178.89.65:39122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:05.542554 systemd[1]: session-75.scope: Deactivated successfully. Aug 13 03:58:05.545476 systemd-logind[1192]: Session 75 logged out. Waiting for processes to exit. Aug 13 03:58:05.549235 systemd-logind[1192]: Removed session 75. Aug 13 03:58:10.683654 systemd[1]: Started sshd@79-10.244.16.30:22-139.178.89.65:55274.service. Aug 13 03:58:10.705610 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:58:10.709175 kernel: audit: type=1130 audit(1755057490.687:2243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-10.244.16.30:22-139.178.89.65:55274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:10.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-10.244.16.30:22-139.178.89.65:55274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:11.732000 audit[7592]: USER_ACCT pid=7592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:11.746220 kernel: audit: type=1101 audit(1755057491.732:2244): pid=7592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:11.746730 sshd[7592]: Accepted publickey for core from 139.178.89.65 port 55274 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:58:11.758725 kernel: audit: type=1103 audit(1755057491.744:2245): pid=7592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:11.744000 audit[7592]: CRED_ACQ pid=7592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:11.748114 sshd[7592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:58:11.767948 kernel: audit: type=1006 audit(1755057491.744:2246): pid=7592 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=76 res=1 Aug 13 03:58:11.744000 audit[7592]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a26e9b0 a2=3 a3=0 items=0 ppid=1 pid=7592 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:11.777493 kernel: audit: type=1300 audit(1755057491.744:2246): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a26e9b0 a2=3 a3=0 items=0 ppid=1 pid=7592 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:11.744000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:11.781993 kernel: audit: type=1327 audit(1755057491.744:2246): proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:11.784627 systemd-logind[1192]: New session 76 of user core. Aug 13 03:58:11.786030 systemd[1]: Started session-76.scope. Aug 13 03:58:11.801000 audit[7592]: USER_START pid=7592 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:11.812352 kernel: audit: type=1105 audit(1755057491.801:2247): pid=7592 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:11.810000 audit[7607]: CRED_ACQ pid=7607 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:11.820081 kernel: audit: type=1103 audit(1755057491.810:2248): pid=7607 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:13.324524 sshd[7592]: pam_unix(sshd:session): session closed for user core Aug 13 03:58:13.328000 audit[7592]: USER_END pid=7592 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:13.341606 kernel: audit: type=1106 audit(1755057493.328:2249): pid=7592 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:13.342045 kernel: audit: type=1104 audit(1755057493.328:2250): pid=7592 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:13.328000 audit[7592]: CRED_DISP pid=7592 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:13.346795 systemd[1]: sshd@79-10.244.16.30:22-139.178.89.65:55274.service: Deactivated successfully. Aug 13 03:58:13.350494 systemd[1]: session-76.scope: Deactivated successfully. Aug 13 03:58:13.351692 systemd-logind[1192]: Session 76 logged out. Waiting for processes to exit. Aug 13 03:58:13.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-10.244.16.30:22-139.178.89.65:55274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:13.354669 systemd-logind[1192]: Removed session 76. Aug 13 03:58:14.551505 update_engine[1194]: I0813 03:58:14.549460 1194 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Aug 13 03:58:14.559101 update_engine[1194]: I0813 03:58:14.559053 1194 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Aug 13 03:58:14.559750 update_engine[1194]: I0813 03:58:14.559559 1194 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Aug 13 03:58:14.560181 update_engine[1194]: E0813 03:58:14.560149 1194 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Aug 13 03:58:14.560974 update_engine[1194]: I0813 03:58:14.560943 1194 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Aug 13 03:58:14.560974 update_engine[1194]: I0813 03:58:14.560971 1194 omaha_request_action.cc:621] Omaha request response: Aug 13 03:58:14.561818 update_engine[1194]: E0813 03:58:14.561789 1194 omaha_request_action.cc:640] Omaha request network transfer failed. Aug 13 03:58:14.561913 update_engine[1194]: I0813 03:58:14.561889 1194 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Aug 13 03:58:14.561913 update_engine[1194]: I0813 03:58:14.561903 1194 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Aug 13 03:58:14.561913 update_engine[1194]: I0813 03:58:14.561909 1194 update_attempter.cc:306] Processing Done. Aug 13 03:58:14.562836 update_engine[1194]: E0813 03:58:14.562561 1194 update_attempter.cc:619] Update failed. Aug 13 03:58:14.562836 update_engine[1194]: I0813 03:58:14.562577 1194 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Aug 13 03:58:14.562836 update_engine[1194]: I0813 03:58:14.562582 1194 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Aug 13 03:58:14.562836 update_engine[1194]: I0813 03:58:14.562589 1194 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Aug 13 03:58:14.565893 update_engine[1194]: I0813 03:58:14.565690 1194 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Aug 13 03:58:14.567842 update_engine[1194]: I0813 03:58:14.567806 1194 omaha_request_action.cc:270] Posting an Omaha request to disabled Aug 13 03:58:14.567842 update_engine[1194]: I0813 03:58:14.567831 1194 omaha_request_action.cc:271] Request: Aug 13 03:58:14.567842 update_engine[1194]: Aug 13 03:58:14.567842 update_engine[1194]: Aug 13 03:58:14.567842 update_engine[1194]: Aug 13 03:58:14.567842 update_engine[1194]: Aug 13 03:58:14.567842 update_engine[1194]: Aug 13 03:58:14.567842 update_engine[1194]: Aug 13 03:58:14.567842 update_engine[1194]: I0813 03:58:14.567840 1194 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Aug 13 03:58:14.568993 update_engine[1194]: I0813 03:58:14.568205 1194 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Aug 13 03:58:14.568993 update_engine[1194]: I0813 03:58:14.568502 1194 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Aug 13 03:58:14.570067 update_engine[1194]: E0813 03:58:14.569064 1194 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Aug 13 03:58:14.570067 update_engine[1194]: I0813 03:58:14.569160 1194 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Aug 13 03:58:14.570067 update_engine[1194]: I0813 03:58:14.569178 1194 omaha_request_action.cc:621] Omaha request response: Aug 13 03:58:14.570067 update_engine[1194]: I0813 03:58:14.569186 1194 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Aug 13 03:58:14.570067 update_engine[1194]: I0813 03:58:14.569192 1194 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Aug 13 03:58:14.570067 update_engine[1194]: I0813 03:58:14.569198 1194 update_attempter.cc:306] Processing Done. Aug 13 03:58:14.570067 update_engine[1194]: I0813 03:58:14.569206 1194 update_attempter.cc:310] Error event sent. Aug 13 03:58:14.570067 update_engine[1194]: I0813 03:58:14.569217 1194 update_check_scheduler.cc:74] Next update check in 42m33s Aug 13 03:58:14.603188 locksmithd[1234]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Aug 13 03:58:14.603188 locksmithd[1234]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Aug 13 03:58:18.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-10.244.16.30:22-139.178.89.65:55288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:18.537144 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:58:18.585413 kernel: audit: type=1130 audit(1755057498.485:2252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-10.244.16.30:22-139.178.89.65:55288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:18.481558 systemd[1]: Started sshd@80-10.244.16.30:22-139.178.89.65:55288.service. Aug 13 03:58:19.630000 audit[7657]: USER_ACCT pid=7657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:19.649999 kernel: audit: type=1101 audit(1755057499.630:2253): pid=7657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:19.650189 sshd[7657]: Accepted publickey for core from 139.178.89.65 port 55288 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:58:19.654000 audit[7657]: CRED_ACQ pid=7657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:19.662970 kernel: audit: type=1103 audit(1755057499.654:2254): pid=7657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:19.668522 kernel: audit: type=1006 audit(1755057499.654:2255): pid=7657 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=77 res=1 Aug 13 03:58:19.668790 sshd[7657]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:58:19.701372 kernel: audit: type=1300 audit(1755057499.654:2255): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff549eab30 a2=3 a3=0 items=0 ppid=1 pid=7657 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:19.701662 kernel: audit: type=1327 audit(1755057499.654:2255): proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:19.654000 audit[7657]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff549eab30 a2=3 a3=0 items=0 ppid=1 pid=7657 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:19.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:19.760845 systemd[1]: Started session-77.scope. Aug 13 03:58:19.761503 systemd-logind[1192]: New session 77 of user core. Aug 13 03:58:19.787652 kernel: audit: type=1105 audit(1755057499.775:2256): pid=7657 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:19.775000 audit[7657]: USER_START pid=7657 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:19.784000 audit[7659]: CRED_ACQ pid=7659 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:19.794957 kernel: audit: type=1103 audit(1755057499.784:2257): pid=7659 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:21.777234 sshd[7657]: pam_unix(sshd:session): session closed for user core Aug 13 03:58:21.818998 kernel: audit: type=1106 audit(1755057501.787:2258): pid=7657 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:21.822729 kernel: audit: type=1104 audit(1755057501.799:2259): pid=7657 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:21.787000 audit[7657]: USER_END pid=7657 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:21.799000 audit[7657]: CRED_DISP pid=7657 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:21.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-10.244.16.30:22-139.178.89.65:55288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:21.810599 systemd[1]: sshd@80-10.244.16.30:22-139.178.89.65:55288.service: Deactivated successfully. Aug 13 03:58:21.813762 systemd[1]: session-77.scope: Deactivated successfully. Aug 13 03:58:21.816963 systemd-logind[1192]: Session 77 logged out. Waiting for processes to exit. Aug 13 03:58:21.822977 systemd-logind[1192]: Removed session 77. Aug 13 03:58:26.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-10.244.16.30:22-139.178.89.65:54698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:26.951231 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 03:58:26.953019 kernel: audit: type=1130 audit(1755057506.939:2261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-10.244.16.30:22-139.178.89.65:54698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:26.940560 systemd[1]: Started sshd@81-10.244.16.30:22-139.178.89.65:54698.service. Aug 13 03:58:27.949000 audit[7689]: USER_ACCT pid=7689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:27.957737 sshd[7689]: Accepted publickey for core from 139.178.89.65 port 54698 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:58:27.963456 kernel: audit: type=1101 audit(1755057507.949:2262): pid=7689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:27.963574 kernel: audit: type=1103 audit(1755057507.961:2263): pid=7689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:27.961000 audit[7689]: CRED_ACQ pid=7689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:27.974706 sshd[7689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:58:27.961000 audit[7689]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8b670fd0 a2=3 a3=0 items=0 ppid=1 pid=7689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:27.984514 kernel: audit: type=1006 audit(1755057507.961:2264): pid=7689 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=78 res=1 Aug 13 03:58:27.984664 kernel: audit: type=1300 audit(1755057507.961:2264): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8b670fd0 a2=3 a3=0 items=0 ppid=1 pid=7689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:27.984727 kernel: audit: type=1327 audit(1755057507.961:2264): proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:27.961000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:28.013839 systemd-logind[1192]: New session 78 of user core. Aug 13 03:58:28.016634 systemd[1]: Started session-78.scope. Aug 13 03:58:28.029000 audit[7689]: USER_START pid=7689 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:28.039770 kernel: audit: type=1105 audit(1755057508.029:2265): pid=7689 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:28.039000 audit[7691]: CRED_ACQ pid=7691 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:28.048049 kernel: audit: type=1103 audit(1755057508.039:2266): pid=7691 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:29.477685 sshd[7689]: pam_unix(sshd:session): session closed for user core Aug 13 03:58:29.513320 kernel: audit: type=1106 audit(1755057509.484:2267): pid=7689 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:29.484000 audit[7689]: USER_END pid=7689 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:29.526494 kernel: audit: type=1104 audit(1755057509.510:2268): pid=7689 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:29.510000 audit[7689]: CRED_DISP pid=7689 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:29.531152 systemd[1]: sshd@81-10.244.16.30:22-139.178.89.65:54698.service: Deactivated successfully. Aug 13 03:58:29.532834 systemd[1]: session-78.scope: Deactivated successfully. Aug 13 03:58:29.535173 systemd-logind[1192]: Session 78 logged out. Waiting for processes to exit. Aug 13 03:58:29.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-10.244.16.30:22-139.178.89.65:54698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:29.537297 systemd-logind[1192]: Removed session 78. Aug 13 03:58:31.768000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:31.768000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:31.768000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026bab40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:58:31.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:58:31.768000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030d9c00 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:58:31.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:58:33.472956 kernel: kauditd_printk_skb: 7 callbacks suppressed Aug 13 03:58:33.489490 kernel: audit: type=1400 audit(1755057513.460:2272): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.496784 kernel: audit: type=1300 audit(1755057513.460:2272): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011dd2ae0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:58:33.496875 kernel: audit: type=1327 audit(1755057513.460:2272): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:58:33.496982 kernel: audit: type=1400 audit(1755057513.460:2273): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.460000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.460000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011dd2ae0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:58:33.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:58:33.515020 kernel: audit: type=1300 audit(1755057513.460:2273): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011dd2d20 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:58:33.515100 kernel: audit: type=1327 audit(1755057513.460:2273): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:58:33.521566 kernel: audit: type=1400 audit(1755057513.460:2274): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.460000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.460000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011dd2d20 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:58:33.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:58:33.460000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.460000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0043eba40 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:58:33.538272 kernel: audit: type=1300 audit(1755057513.460:2274): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0043eba40 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:58:33.538516 kernel: audit: type=1327 audit(1755057513.460:2274): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:58:33.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:58:33.469000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.546020 kernel: audit: type=1400 audit(1755057513.469:2275): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.469000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011dd3290 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:58:33.469000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:58:33.496000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.496000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011dd33e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:58:33.496000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:58:33.496000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:33.496000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00532b140 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:58:33.496000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:58:34.633599 systemd[1]: Started sshd@82-10.244.16.30:22-139.178.89.65:59048.service. Aug 13 03:58:34.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-10.244.16.30:22-139.178.89.65:59048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:35.609000 audit[7702]: USER_ACCT pid=7702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:35.612026 sshd[7702]: Accepted publickey for core from 139.178.89.65 port 59048 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:58:35.613000 audit[7702]: CRED_ACQ pid=7702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:35.613000 audit[7702]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcc41d810 a2=3 a3=0 items=0 ppid=1 pid=7702 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:35.613000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:35.616405 sshd[7702]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:58:35.633099 systemd-logind[1192]: New session 79 of user core. Aug 13 03:58:35.633659 systemd[1]: Started session-79.scope. Aug 13 03:58:35.642000 audit[7702]: USER_START pid=7702 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:35.645000 audit[7704]: CRED_ACQ pid=7704 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:37.217653 sshd[7702]: pam_unix(sshd:session): session closed for user core Aug 13 03:58:37.222000 audit[7702]: USER_END pid=7702 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:37.223000 audit[7702]: CRED_DISP pid=7702 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:37.239098 systemd[1]: sshd@82-10.244.16.30:22-139.178.89.65:59048.service: Deactivated successfully. Aug 13 03:58:37.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-10.244.16.30:22-139.178.89.65:59048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:37.246450 systemd[1]: session-79.scope: Deactivated successfully. Aug 13 03:58:37.247947 systemd-logind[1192]: Session 79 logged out. Waiting for processes to exit. Aug 13 03:58:37.249904 systemd-logind[1192]: Removed session 79. Aug 13 03:58:40.463000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:40.503770 kernel: kauditd_printk_skb: 19 callbacks suppressed Aug 13 03:58:40.525953 kernel: audit: type=1400 audit(1755057520.463:2287): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:40.527290 kernel: audit: type=1400 audit(1755057520.466:2288): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:40.527375 kernel: audit: type=1300 audit(1755057520.466:2288): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00177e080 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:58:40.527443 kernel: audit: type=1327 audit(1755057520.466:2288): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:58:40.527509 kernel: audit: type=1300 audit(1755057520.463:2287): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001924140 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:58:40.527574 kernel: audit: type=1327 audit(1755057520.463:2287): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:58:40.466000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:40.466000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00177e080 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:58:40.534830 kernel: audit: type=1400 audit(1755057520.492:2289): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:40.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:58:40.463000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001924140 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:58:40.548368 kernel: audit: type=1300 audit(1755057520.492:2289): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019241a0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:58:40.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:58:40.492000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:40.492000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019241a0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:58:40.492000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:58:40.559019 kernel: audit: type=1327 audit(1755057520.492:2289): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:58:40.511000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:40.567042 kernel: audit: type=1400 audit(1755057520.511:2290): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:58:40.511000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00177e0e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:58:40.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:58:42.381724 systemd[1]: Started sshd@83-10.244.16.30:22-139.178.89.65:57354.service. Aug 13 03:58:42.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-10.244.16.30:22-139.178.89.65:57354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:43.385000 audit[7737]: USER_ACCT pid=7737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:43.387000 audit[7737]: CRED_ACQ pid=7737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:43.387000 audit[7737]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47a59c60 a2=3 a3=0 items=0 ppid=1 pid=7737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:43.387000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:43.398137 sshd[7737]: Accepted publickey for core from 139.178.89.65 port 57354 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:58:43.391092 sshd[7737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:58:43.427060 systemd-logind[1192]: New session 80 of user core. Aug 13 03:58:43.428010 systemd[1]: Started session-80.scope. Aug 13 03:58:43.442000 audit[7737]: USER_START pid=7737 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:43.444000 audit[7739]: CRED_ACQ pid=7739 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:44.793948 sshd[7737]: pam_unix(sshd:session): session closed for user core Aug 13 03:58:44.795000 audit[7737]: USER_END pid=7737 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:44.798000 audit[7737]: CRED_DISP pid=7737 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:44.812959 systemd[1]: sshd@83-10.244.16.30:22-139.178.89.65:57354.service: Deactivated successfully. Aug 13 03:58:44.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-10.244.16.30:22-139.178.89.65:57354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:44.822599 systemd[1]: session-80.scope: Deactivated successfully. Aug 13 03:58:44.823986 systemd-logind[1192]: Session 80 logged out. Waiting for processes to exit. Aug 13 03:58:44.825386 systemd-logind[1192]: Removed session 80. Aug 13 03:58:44.943491 systemd[1]: Started sshd@84-10.244.16.30:22-139.178.89.65:57370.service. Aug 13 03:58:44.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-10.244.16.30:22-139.178.89.65:57370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:45.878506 sshd[7748]: Accepted publickey for core from 139.178.89.65 port 57370 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:58:45.892033 kernel: kauditd_printk_skb: 14 callbacks suppressed Aug 13 03:58:45.904061 kernel: audit: type=1101 audit(1755057525.877:2301): pid=7748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:45.907188 kernel: audit: type=1103 audit(1755057525.890:2302): pid=7748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:45.907705 kernel: audit: type=1006 audit(1755057525.890:2303): pid=7748 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=81 res=1 Aug 13 03:58:45.908203 kernel: audit: type=1300 audit(1755057525.890:2303): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6ee1a530 a2=3 a3=0 items=0 ppid=1 pid=7748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:45.877000 audit[7748]: USER_ACCT pid=7748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:45.890000 audit[7748]: CRED_ACQ pid=7748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:45.890000 audit[7748]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6ee1a530 a2=3 a3=0 items=0 ppid=1 pid=7748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:45.900276 sshd[7748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:58:45.890000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:45.923085 kernel: audit: type=1327 audit(1755057525.890:2303): proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:45.925365 systemd-logind[1192]: New session 81 of user core. Aug 13 03:58:45.927200 systemd[1]: Started session-81.scope. Aug 13 03:58:45.936000 audit[7748]: USER_START pid=7748 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:45.947106 kernel: audit: type=1105 audit(1755057525.936:2304): pid=7748 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:45.946000 audit[7791]: CRED_ACQ pid=7791 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:45.955092 kernel: audit: type=1103 audit(1755057525.946:2305): pid=7791 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:46.515000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:58:46.523955 kernel: audit: type=1400 audit(1755057526.515:2306): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:58:46.524634 kernel: audit: type=1300 audit(1755057526.515:2306): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001cd1f20 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:58:46.515000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001cd1f20 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:58:46.515000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:58:46.540123 kernel: audit: type=1327 audit(1755057526.515:2306): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:58:47.209437 sshd[7748]: pam_unix(sshd:session): session closed for user core Aug 13 03:58:47.221000 audit[7748]: USER_END pid=7748 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:47.222000 audit[7748]: CRED_DISP pid=7748 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:47.231617 systemd[1]: sshd@84-10.244.16.30:22-139.178.89.65:57370.service: Deactivated successfully. Aug 13 03:58:47.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-10.244.16.30:22-139.178.89.65:57370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:47.233272 systemd[1]: session-81.scope: Deactivated successfully. Aug 13 03:58:47.234787 systemd-logind[1192]: Session 81 logged out. Waiting for processes to exit. Aug 13 03:58:47.238660 systemd-logind[1192]: Removed session 81. Aug 13 03:58:47.353855 systemd[1]: Started sshd@85-10.244.16.30:22-139.178.89.65:57384.service. Aug 13 03:58:47.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-10.244.16.30:22-139.178.89.65:57384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:48.301000 audit[7799]: USER_ACCT pid=7799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:48.305795 sshd[7799]: Accepted publickey for core from 139.178.89.65 port 57384 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:58:48.314000 audit[7799]: CRED_ACQ pid=7799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:48.314000 audit[7799]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee70613d0 a2=3 a3=0 items=0 ppid=1 pid=7799 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:48.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:48.317339 sshd[7799]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:58:48.349560 systemd-logind[1192]: New session 82 of user core. Aug 13 03:58:48.350768 systemd[1]: Started session-82.scope. Aug 13 03:58:48.360000 audit[7799]: USER_START pid=7799 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:48.363000 audit[7801]: CRED_ACQ pid=7801 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:55.554000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:58:55.685521 kernel: kauditd_printk_skb: 11 callbacks suppressed Aug 13 03:58:55.693288 kernel: audit: type=1400 audit(1755057535.554:2316): avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:58:55.694165 kernel: audit: type=1300 audit(1755057535.554:2316): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002953420 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:58:55.694257 kernel: audit: type=1327 audit(1755057535.554:2316): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:58:55.554000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002953420 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:58:55.554000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:58:56.681000 audit[7813]: NETFILTER_CFG table=filter:128 family=2 entries=20 op=nft_register_rule pid=7813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:58:56.811382 kernel: audit: type=1325 audit(1755057536.681:2317): table=filter:128 family=2 entries=20 op=nft_register_rule pid=7813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:58:56.825976 kernel: audit: type=1300 audit(1755057536.681:2317): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe06554fe0 a2=0 a3=7ffe06554fcc items=0 ppid=2131 pid=7813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:56.826649 kernel: audit: type=1327 audit(1755057536.681:2317): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:58:56.827528 kernel: audit: type=1325 audit(1755057536.697:2318): table=nat:129 family=2 entries=26 op=nft_register_rule pid=7813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:58:56.828418 kernel: audit: type=1300 audit(1755057536.697:2318): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe06554fe0 a2=0 a3=0 items=0 ppid=2131 pid=7813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:56.829982 kernel: audit: type=1327 audit(1755057536.697:2318): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:58:56.681000 audit[7813]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe06554fe0 a2=0 a3=7ffe06554fcc items=0 ppid=2131 pid=7813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:56.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:58:56.697000 audit[7813]: NETFILTER_CFG table=nat:129 family=2 entries=26 op=nft_register_rule pid=7813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:58:56.697000 audit[7813]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe06554fe0 a2=0 a3=0 items=0 ppid=2131 pid=7813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:56.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:58:57.075329 sshd[7799]: pam_unix(sshd:session): session closed for user core Aug 13 03:58:57.140000 audit[7799]: USER_END pid=7799 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:57.163978 kernel: audit: type=1106 audit(1755057537.140:2319): pid=7799 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:57.170000 audit[7799]: CRED_DISP pid=7799 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:57.196344 systemd[1]: sshd@85-10.244.16.30:22-139.178.89.65:57384.service: Deactivated successfully. Aug 13 03:58:57.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-10.244.16.30:22-139.178.89.65:57384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:57.202934 systemd[1]: session-82.scope: Deactivated successfully. Aug 13 03:58:57.203143 systemd[1]: session-82.scope: Consumed 1.139s CPU time. Aug 13 03:58:57.205499 systemd-logind[1192]: Session 82 logged out. Waiting for processes to exit. Aug 13 03:58:57.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-10.244.16.30:22-139.178.89.65:42644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 03:58:57.222870 systemd[1]: Started sshd@86-10.244.16.30:22-139.178.89.65:42644.service. Aug 13 03:58:57.232663 systemd-logind[1192]: Removed session 82. Aug 13 03:58:57.453000 audit[7819]: NETFILTER_CFG table=filter:130 family=2 entries=32 op=nft_register_rule pid=7819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:58:57.453000 audit[7819]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffeca4dfd80 a2=0 a3=7ffeca4dfd6c items=0 ppid=2131 pid=7819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:57.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:58:57.480000 audit[7819]: NETFILTER_CFG table=nat:131 family=2 entries=26 op=nft_register_rule pid=7819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:58:57.480000 audit[7819]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffeca4dfd80 a2=0 a3=0 items=0 ppid=2131 pid=7819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:57.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:58:58.354000 audit[7817]: USER_ACCT pid=7817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:58.372000 audit[7817]: CRED_ACQ pid=7817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:58.373000 audit[7817]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecbe968e0 a2=3 a3=0 items=0 ppid=1 pid=7817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:58:58.373000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 03:58:58.377524 sshd[7817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 03:58:58.412529 sshd[7817]: Accepted publickey for core from 139.178.89.65 port 42644 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 03:58:58.491901 systemd-logind[1192]: New session 83 of user core. Aug 13 03:58:58.494714 systemd[1]: Started session-83.scope. Aug 13 03:58:58.522000 audit[7817]: USER_START pid=7817 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:58:58.534000 audit[7820]: CRED_ACQ pid=7820 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 03:59:08.771072 env[1201]: time="2025-08-13T03:59:08.752054974Z" level=error msg="ExecSync for \"f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82\" failed" error="rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 10s exceeded: context deadline exceeded" Aug 13 03:59:31.824530 kernel: kauditd_printk_skb: 16 callbacks suppressed Aug 13 03:59:31.883815 kernel: audit: type=1400 audit(1755057571.806:2330): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:31.886781 kernel: audit: type=1300 audit(1755057571.806:2330): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000914a20 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:31.886885 kernel: audit: type=1327 audit(1755057571.806:2330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:31.887750 kernel: audit: type=1400 audit(1755057571.807:2331): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:31.889276 kernel: audit: type=1300 audit(1755057571.807:2331): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f230e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:31.889347 kernel: audit: type=1327 audit(1755057571.807:2331): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:31.806000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:31.806000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000914a20 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:31.806000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:31.807000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:31.807000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f230e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:31.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:33.472000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:33.630848 kernel: audit: type=1400 audit(1755057573.472:2332): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:33.639468 kernel: audit: type=1300 audit(1755057573.472:2332): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c01109acf0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:59:33.640290 kernel: audit: type=1327 audit(1755057573.472:2332): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:59:33.640364 kernel: audit: type=1400 audit(1755057573.498:2333): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:33.472000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c01109acf0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:59:33.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:59:33.498000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:33.498000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c007e7de20 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:59:33.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:59:33.516000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:33.516000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0108357d0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:59:33.516000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:59:33.532000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:33.532000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007e7de60 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:59:33.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:59:33.535000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:33.535000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c01109ad20 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:59:33.535000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:59:33.540000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:33.540000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c01109ad50 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 03:59:33.540000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 03:59:40.618000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:40.811720 kernel: kauditd_printk_skb: 14 callbacks suppressed Aug 13 03:59:40.838423 kernel: audit: type=1400 audit(1755057580.618:2338): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:40.842275 kernel: audit: type=1300 audit(1755057580.618:2338): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b5ce40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:40.844487 kernel: audit: type=1327 audit(1755057580.618:2338): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:40.844618 kernel: audit: type=1400 audit(1755057580.659:2339): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:40.845311 kernel: audit: type=1300 audit(1755057580.659:2339): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00109d0e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:40.847446 kernel: audit: type=1327 audit(1755057580.659:2339): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:40.848013 kernel: audit: type=1400 audit(1755057580.669:2340): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:40.848099 kernel: audit: type=1300 audit(1755057580.669:2340): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00109d120 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:40.848161 kernel: audit: type=1327 audit(1755057580.669:2340): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:40.849919 kernel: audit: type=1400 audit(1755057580.686:2341): avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:40.618000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b5ce40 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:40.618000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:40.659000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:40.659000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00109d0e0 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:40.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:40.669000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:40.669000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00109d120 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:40.669000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:40.686000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 03:59:40.686000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00109d160 a2=fc6 a3=0 items=0 ppid=1714 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 03:59:40.686000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 03:59:46.639597 kernel: kauditd_printk_skb: 2 callbacks suppressed Aug 13 03:59:46.700015 kernel: audit: type=1400 audit(1755057586.608:2342): avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:59:46.702944 kernel: audit: type=1300 audit(1755057586.608:2342): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0011287e0 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:59:46.704085 kernel: audit: type=1327 audit(1755057586.608:2342): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:59:46.608000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 03:59:46.608000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0011287e0 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 03:59:46.608000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:59:47.843000 audit[7876]: NETFILTER_CFG table=filter:132 family=2 entries=32 op=nft_register_rule pid=7876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:59:47.942831 kernel: audit: type=1325 audit(1755057587.843:2343): table=filter:132 family=2 entries=32 op=nft_register_rule pid=7876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:59:47.949605 kernel: audit: type=1300 audit(1755057587.843:2343): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc33e12270 a2=0 a3=7ffc33e1225c items=0 ppid=2131 pid=7876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:59:47.949770 kernel: audit: type=1327 audit(1755057587.843:2343): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:59:47.949856 kernel: audit: type=1325 audit(1755057587.878:2344): table=nat:133 family=2 entries=38 op=nft_unregister_chain pid=7876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:59:47.949964 kernel: audit: type=1300 audit(1755057587.878:2344): arch=c000003e syscall=46 success=yes exit=11012 a0=3 a1=7ffc33e12270 a2=0 a3=7ffc33e1225c items=0 ppid=2131 pid=7876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:59:47.950038 kernel: audit: type=1327 audit(1755057587.878:2344): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:59:47.843000 audit[7876]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc33e12270 a2=0 a3=7ffc33e1225c items=0 ppid=2131 pid=7876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:59:47.843000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:59:47.878000 audit[7876]: NETFILTER_CFG table=nat:133 family=2 entries=38 op=nft_unregister_chain pid=7876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:59:47.878000 audit[7876]: SYSCALL arch=c000003e syscall=46 success=yes exit=11012 a0=3 a1=7ffc33e12270 a2=0 a3=7ffc33e1225c items=0 ppid=2131 pid=7876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:59:47.878000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:59:52.766000 audit[7879]: NETFILTER_CFG table=filter:134 family=2 entries=33 op=nft_register_rule pid=7879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:59:52.953541 kernel: audit: type=1325 audit(1755057592.766:2345): table=filter:134 family=2 entries=33 op=nft_register_rule pid=7879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:59:52.969428 kernel: audit: type=1300 audit(1755057592.766:2345): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fff244bf580 a2=0 a3=7fff244bf56c items=0 ppid=2131 pid=7879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:59:52.970614 kernel: audit: type=1327 audit(1755057592.766:2345): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:59:52.970684 kernel: audit: type=1325 audit(1755057592.807:2346): table=nat:135 family=2 entries=31 op=nft_unregister_chain pid=7879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:59:52.971976 kernel: audit: type=1300 audit(1755057592.807:2346): arch=c000003e syscall=46 success=yes exit=7564 a0=3 a1=7fff244bf580 a2=0 a3=0 items=0 ppid=2131 pid=7879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:59:52.973055 kernel: audit: type=1327 audit(1755057592.807:2346): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:59:52.766000 audit[7879]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fff244bf580 a2=0 a3=7fff244bf56c items=0 ppid=2131 pid=7879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:59:52.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:59:52.807000 audit[7879]: NETFILTER_CFG table=nat:135 family=2 entries=31 op=nft_unregister_chain pid=7879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 03:59:52.807000 audit[7879]: SYSCALL arch=c000003e syscall=46 success=yes exit=7564 a0=3 a1=7fff244bf580 a2=0 a3=0 items=0 ppid=2131 pid=7879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 03:59:52.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 03:59:55.674000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:59:55.770015 kernel: audit: type=1400 audit(1755057595.674:2347): avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 03:59:55.780673 kernel: audit: type=1300 audit(1755057595.674:2347): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002952160 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:59:55.780813 kernel: audit: type=1327 audit(1755057595.674:2347): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 03:59:55.674000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002952160 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 03:59:55.674000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 04:00:11.681881 systemd[1]: cri-containerd-00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a.scope: Deactivated successfully. Aug 13 04:00:11.803584 kernel: audit: type=1334 audit(1755057611.690:2348): prog-id=80 op=UNLOAD Aug 13 04:00:11.824482 kernel: audit: type=1334 audit(1755057611.690:2349): prog-id=91 op=UNLOAD Aug 13 04:00:11.690000 audit: BPF prog-id=80 op=UNLOAD Aug 13 04:00:11.690000 audit: BPF prog-id=91 op=UNLOAD Aug 13 04:00:11.846735 env[1201]: time="2025-08-13T04:00:11.781010396Z" level=info msg="shim disconnected" id=00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a Aug 13 04:00:11.846735 env[1201]: time="2025-08-13T04:00:11.781166752Z" level=warning msg="cleaning up after shim disconnected" id=00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a namespace=k8s.io Aug 13 04:00:11.846735 env[1201]: time="2025-08-13T04:00:11.781212485Z" level=info msg="cleaning up dead shim" Aug 13 04:00:11.687157 systemd[1]: cri-containerd-00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a.scope: Consumed 15.272s CPU time. Aug 13 04:00:11.871630 env[1201]: time="2025-08-13T04:00:11.860488053Z" level=warning msg="cleanup warnings time=\"2025-08-13T04:00:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7892 runtime=io.containerd.runc.v2\n" Aug 13 04:00:11.844070 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a-rootfs.mount: Deactivated successfully. Aug 13 04:00:11.892696 systemd[1]: cri-containerd-f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8.scope: Deactivated successfully. Aug 13 04:00:11.893139 systemd[1]: cri-containerd-f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8.scope: Consumed 1min 53.629s CPU time. Aug 13 04:00:11.892000 audit: BPF prog-id=117 op=UNLOAD Aug 13 04:00:11.897958 kernel: audit: type=1334 audit(1755057611.892:2350): prog-id=117 op=UNLOAD Aug 13 04:00:11.899000 audit: BPF prog-id=120 op=UNLOAD Aug 13 04:00:11.902966 kernel: audit: type=1334 audit(1755057611.899:2351): prog-id=120 op=UNLOAD Aug 13 04:00:11.980537 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8-rootfs.mount: Deactivated successfully. Aug 13 04:00:11.985981 env[1201]: time="2025-08-13T04:00:11.985898240Z" level=info msg="shim disconnected" id=f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8 Aug 13 04:00:11.987813 env[1201]: time="2025-08-13T04:00:11.986322528Z" level=warning msg="cleaning up after shim disconnected" id=f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8 namespace=k8s.io Aug 13 04:00:11.987813 env[1201]: time="2025-08-13T04:00:11.986391908Z" level=info msg="cleaning up dead shim" Aug 13 04:00:12.027053 env[1201]: time="2025-08-13T04:00:12.026971057Z" level=warning msg="cleanup warnings time=\"2025-08-13T04:00:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7919 runtime=io.containerd.runc.v2\n" Aug 13 04:00:12.099205 systemd[1]: cri-containerd-02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459.scope: Deactivated successfully. Aug 13 04:00:12.099534 systemd[1]: cri-containerd-02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459.scope: Consumed 6.444s CPU time. Aug 13 04:00:12.102000 audit: BPF prog-id=84 op=UNLOAD Aug 13 04:00:12.102000 audit: BPF prog-id=85 op=UNLOAD Aug 13 04:00:12.120991 kernel: audit: type=1334 audit(1755057612.102:2352): prog-id=84 op=UNLOAD Aug 13 04:00:12.121162 kernel: audit: type=1334 audit(1755057612.102:2353): prog-id=85 op=UNLOAD Aug 13 04:00:12.179734 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459-rootfs.mount: Deactivated successfully. Aug 13 04:00:12.183156 env[1201]: time="2025-08-13T04:00:12.183094076Z" level=info msg="shim disconnected" id=02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459 Aug 13 04:00:12.183558 env[1201]: time="2025-08-13T04:00:12.183523942Z" level=warning msg="cleaning up after shim disconnected" id=02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459 namespace=k8s.io Aug 13 04:00:12.183754 env[1201]: time="2025-08-13T04:00:12.183723902Z" level=info msg="cleaning up dead shim" Aug 13 04:00:12.211881 env[1201]: time="2025-08-13T04:00:12.211814443Z" level=warning msg="cleanup warnings time=\"2025-08-13T04:00:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7943 runtime=io.containerd.runc.v2\n" Aug 13 04:00:13.938858 kubelet[1983]: E0813 04:00:13.938526 1983 controller.go:195] "Failed to update lease" err="Put \"https://10.244.16.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-amtey.gb1.brightbox.com?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" Aug 13 04:00:14.079646 kubelet[1983]: E0813 04:00:14.079554 1983 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 10s exceeded: context deadline exceeded" containerID="f98c4f37658db1b9cff0b161a9d7a0e18186434f711ef970b537e9078b343e82" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Aug 13 04:00:14.091899 kubelet[1983]: W0813 04:00:14.088064 1983 reflector.go:484] object-"kube-system"/"coredns": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.096595 kubelet[1983]: W0813 04:00:14.096558 1983 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.098540 kubelet[1983]: E0813 04:00:14.093310 1983 controller.go:195] "Failed to update lease" err="Operation cannot be fulfilled on leases.coordination.k8s.io \"srv-amtey.gb1.brightbox.com\": the object has been modified; please apply your changes to the latest version and try again" Aug 13 04:00:14.099020 kubelet[1983]: W0813 04:00:14.098889 1983 reflector.go:484] object-"calico-system"/"goldmane": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.099179 kubelet[1983]: W0813 04:00:14.098376 1983 reflector.go:484] object-"calico-system"/"typha-certs": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.099912 kubelet[1983]: W0813 04:00:14.099884 1983 reflector.go:484] object-"calico-apiserver"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.100106 kubelet[1983]: W0813 04:00:14.100078 1983 reflector.go:484] pkg/kubelet/config/apiserver.go:66: watch of *v1.Pod ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.100268 kubelet[1983]: W0813 04:00:14.100240 1983 reflector.go:484] object-"kube-system"/"kube-proxy": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.100523 kubelet[1983]: W0813 04:00:14.100495 1983 reflector.go:484] object-"calico-system"/"tigera-ca-bundle": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.101029 kubelet[1983]: W0813 04:00:14.100869 1983 reflector.go:484] object-"calico-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.102416 kubelet[1983]: W0813 04:00:14.101203 1983 reflector.go:484] object-"calico-system"/"goldmane-ca-bundle": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.102585 kubelet[1983]: W0813 04:00:14.101221 1983 reflector.go:484] object-"calico-apiserver"/"calico-apiserver-certs": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.102722 kubelet[1983]: W0813 04:00:14.101252 1983 reflector.go:484] object-"calico-system"/"whisker-ca-bundle": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.102857 kubelet[1983]: W0813 04:00:14.101270 1983 reflector.go:484] object-"calico-system"/"node-certs": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.107569 kubelet[1983]: W0813 04:00:14.101281 1983 reflector.go:484] object-"calico-system"/"goldmane-key-pair": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.108215 kubelet[1983]: W0813 04:00:14.101302 1983 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.108574 kubelet[1983]: W0813 04:00:14.101312 1983 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Node ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.108805 kubelet[1983]: W0813 04:00:14.101325 1983 reflector.go:484] object-"calico-system"/"whisker-backend-key-pair": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.109780 kubelet[1983]: W0813 04:00:14.101337 1983 reflector.go:484] object-"kube-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.109780 kubelet[1983]: W0813 04:00:14.101464 1983 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.109780 kubelet[1983]: W0813 04:00:14.102293 1983 reflector.go:484] object-"tigera-operator"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Aug 13 04:00:14.190899 kubelet[1983]: E0813 04:00:14.190755 1983 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1m23.221s" Aug 13 04:00:14.192320 kubelet[1983]: I0813 04:00:14.192293 1983 scope.go:117] "RemoveContainer" containerID="00306ea0b4061d5d4fb2a0f322c279cf924c98f7e72e15c3739625c38c49192a" Aug 13 04:00:14.236764 env[1201]: time="2025-08-13T04:00:14.236652699Z" level=info msg="CreateContainer within sandbox \"2e51421c20d8e397c18656a0dcd3dbc8f7061f285b2b8c36a46eca7575cbcaa9\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Aug 13 04:00:14.261837 kubelet[1983]: I0813 04:00:14.261568 1983 scope.go:117] "RemoveContainer" containerID="f3bf215f93bc1e59283b503eb331ff651ce8e58f5fe0a60ad25b7fe1ae6a7fb8" Aug 13 04:00:14.328654 env[1201]: time="2025-08-13T04:00:14.328347366Z" level=info msg="CreateContainer within sandbox \"c6ac00e60c933f463ba5ef5ef0920623923e9dc4ad748a0d098b51d3969f2dbf\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Aug 13 04:00:14.357380 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1993333063.mount: Deactivated successfully. Aug 13 04:00:14.370297 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount67898782.mount: Deactivated successfully. Aug 13 04:00:14.371543 env[1201]: time="2025-08-13T04:00:14.370307952Z" level=info msg="CreateContainer within sandbox \"2e51421c20d8e397c18656a0dcd3dbc8f7061f285b2b8c36a46eca7575cbcaa9\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"850f0694a8f79619eb546e7de4644b8af78bfdcd291b563dcf0594fb682086f6\"" Aug 13 04:00:14.377293 env[1201]: time="2025-08-13T04:00:14.377241973Z" level=info msg="StartContainer for \"850f0694a8f79619eb546e7de4644b8af78bfdcd291b563dcf0594fb682086f6\"" Aug 13 04:00:14.492640 sshd[7817]: pam_unix(sshd:session): session closed for user core Aug 13 04:00:14.516920 systemd[1]: Started cri-containerd-850f0694a8f79619eb546e7de4644b8af78bfdcd291b563dcf0594fb682086f6.scope. Aug 13 04:00:14.525000 audit[7817]: USER_END pid=7817 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:14.543739 kernel: audit: type=1106 audit(1755057614.525:2354): pid=7817 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:14.545938 env[1201]: time="2025-08-13T04:00:14.543518561Z" level=info msg="CreateContainer within sandbox \"c6ac00e60c933f463ba5ef5ef0920623923e9dc4ad748a0d098b51d3969f2dbf\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"7312fa98816c0a073d94cf0c3e7ecbfa3ffd0e17bfb3a6b342a45de6d1d73a78\"" Aug 13 04:00:14.546818 env[1201]: time="2025-08-13T04:00:14.546778363Z" level=info msg="StartContainer for \"7312fa98816c0a073d94cf0c3e7ecbfa3ffd0e17bfb3a6b342a45de6d1d73a78\"" Aug 13 04:00:14.549633 systemd[1]: sshd@86-10.244.16.30:22-139.178.89.65:42644.service: Deactivated successfully. Aug 13 04:00:14.551642 systemd[1]: session-83.scope: Deactivated successfully. Aug 13 04:00:14.551839 systemd[1]: session-83.scope: Consumed 17.584s CPU time. Aug 13 04:00:14.555312 systemd-logind[1192]: Session 83 logged out. Waiting for processes to exit. Aug 13 04:00:14.564302 kernel: audit: type=1104 audit(1755057614.540:2355): pid=7817 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:14.540000 audit[7817]: CRED_DISP pid=7817 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:14.563842 systemd-logind[1192]: Removed session 83. Aug 13 04:00:14.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-10.244.16.30:22-139.178.89.65:42644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:14.574337 kernel: audit: type=1131 audit(1755057614.549:2356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-10.244.16.30:22-139.178.89.65:42644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:14.619822 systemd[1]: Started cri-containerd-7312fa98816c0a073d94cf0c3e7ecbfa3ffd0e17bfb3a6b342a45de6d1d73a78.scope. Aug 13 04:00:14.631213 kernel: audit: type=1130 audit(1755057614.622:2357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-10.244.16.30:22-139.178.89.65:49376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:14.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-10.244.16.30:22-139.178.89.65:49376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:14.622974 systemd[1]: Started sshd@87-10.244.16.30:22-139.178.89.65:49376.service. Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.679000 audit: BPF prog-id=234 op=LOAD Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2039 pid=8052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313266613938383136633061303733643934636630633365376563 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2039 pid=8052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313266613938383136633061303733643934636630633365376563 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.680000 audit: BPF prog-id=235 op=LOAD Aug 13 04:00:14.680000 audit[8052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002acc60 items=0 ppid=2039 pid=8052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313266613938383136633061303733643934636630633365376563 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit: BPF prog-id=236 op=LOAD Aug 13 04:00:14.681000 audit[8052]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002acca8 items=0 ppid=2039 pid=8052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313266613938383136633061303733643934636630633365376563 Aug 13 04:00:14.681000 audit: BPF prog-id=236 op=UNLOAD Aug 13 04:00:14.681000 audit: BPF prog-id=235 op=UNLOAD Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { perfmon } for pid=8052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit[8052]: AVC avc: denied { bpf } for pid=8052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.681000 audit: BPF prog-id=237 op=LOAD Aug 13 04:00:14.681000 audit[8052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002ad0b8 items=0 ppid=2039 pid=8052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313266613938383136633061303733643934636630633365376563 Aug 13 04:00:14.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.687000 audit: BPF prog-id=238 op=LOAD Aug 13 04:00:14.689000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.689000 audit[8008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1714 pid=8008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306630363934613866373936313965623534366537646534363434 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1714 pid=8008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306630363934613866373936313965623534366537646534363434 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.690000 audit: BPF prog-id=239 op=LOAD Aug 13 04:00:14.690000 audit[8008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000220b80 items=0 ppid=1714 pid=8008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306630363934613866373936313965623534366537646534363434 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit: BPF prog-id=240 op=LOAD Aug 13 04:00:14.691000 audit[8008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000220bc8 items=0 ppid=1714 pid=8008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306630363934613866373936313965623534366537646534363434 Aug 13 04:00:14.691000 audit: BPF prog-id=240 op=UNLOAD Aug 13 04:00:14.691000 audit: BPF prog-id=239 op=UNLOAD Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { perfmon } for pid=8008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit[8008]: AVC avc: denied { bpf } for pid=8008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:14.691000 audit: BPF prog-id=241 op=LOAD Aug 13 04:00:14.691000 audit[8008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000220fd8 items=0 ppid=1714 pid=8008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:14.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306630363934613866373936313965623534366537646534363434 Aug 13 04:00:14.858183 env[1201]: time="2025-08-13T04:00:14.858031095Z" level=info msg="StartContainer for \"7312fa98816c0a073d94cf0c3e7ecbfa3ffd0e17bfb3a6b342a45de6d1d73a78\" returns successfully" Aug 13 04:00:14.863315 env[1201]: time="2025-08-13T04:00:14.863259913Z" level=info msg="StartContainer for \"850f0694a8f79619eb546e7de4644b8af78bfdcd291b563dcf0594fb682086f6\" returns successfully" Aug 13 04:00:15.345297 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.LBD8pS.mount: Deactivated successfully. Aug 13 04:00:15.715190 systemd[1]: run-containerd-runc-k8s.io-7b95f61da757830d8b43179f9d248f1796e136511b3e86269ce6750626fe3099-runc.gOwf5s.mount: Deactivated successfully. Aug 13 04:00:15.727000 audit[8062]: USER_ACCT pid=8062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:15.740805 sshd[8062]: Accepted publickey for core from 139.178.89.65 port 49376 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 04:00:15.741000 audit[8062]: CRED_ACQ pid=8062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:15.741000 audit[8062]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc667a3b00 a2=3 a3=0 items=0 ppid=1 pid=8062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:15.741000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 04:00:15.751246 sshd[8062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 04:00:15.834557 systemd-logind[1192]: New session 84 of user core. Aug 13 04:00:15.837033 systemd[1]: Started session-84.scope. Aug 13 04:00:15.848000 audit[8062]: USER_START pid=8062 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:15.856000 audit[8178]: CRED_ACQ pid=8178 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:16.012588 systemd[1]: run-containerd-runc-k8s.io-d787afa2445c0c6e85dc8c2e832cca710b440aafce16f21556d82d6b523979c3-runc.jxUQl3.mount: Deactivated successfully. Aug 13 04:00:17.187031 kubelet[1983]: I0813 04:00:17.186966 1983 scope.go:117] "RemoveContainer" containerID="02ae934dd53367fc5c74bad729ee94285e53a63c369b6a463fbbc1406b667459" Aug 13 04:00:17.395119 env[1201]: time="2025-08-13T04:00:17.394476888Z" level=info msg="CreateContainer within sandbox \"91169313d08f2145877255f6c10d9f975b36e58de435d0f87a40b87772309416\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Aug 13 04:00:17.480982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3981118926.mount: Deactivated successfully. Aug 13 04:00:17.495056 env[1201]: time="2025-08-13T04:00:17.494988472Z" level=info msg="CreateContainer within sandbox \"91169313d08f2145877255f6c10d9f975b36e58de435d0f87a40b87772309416\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"30747f4ec04dfbff05b109c7830b7a1150b6c0c6e16cd0884ede1956a536f4a7\"" Aug 13 04:00:17.501979 env[1201]: time="2025-08-13T04:00:17.501884346Z" level=info msg="StartContainer for \"30747f4ec04dfbff05b109c7830b7a1150b6c0c6e16cd0884ede1956a536f4a7\"" Aug 13 04:00:17.601586 systemd[1]: Started cri-containerd-30747f4ec04dfbff05b109c7830b7a1150b6c0c6e16cd0884ede1956a536f4a7.scope. Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.680240 kernel: kauditd_printk_skb: 121 callbacks suppressed Aug 13 04:00:17.688461 kernel: audit: type=1400 audit(1755057617.663:2399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.688981 kernel: audit: type=1400 audit(1755057617.663:2400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.689508 kernel: audit: type=1400 audit(1755057617.663:2401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.689946 kernel: audit: type=1400 audit(1755057617.663:2402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.700035 kernel: audit: type=1400 audit(1755057617.663:2403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.700390 kernel: audit: type=1400 audit(1755057617.663:2404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.711978 kernel: audit: type=1400 audit(1755057617.663:2405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.721159 kernel: audit: type=1400 audit(1755057617.663:2406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.739408 kernel: audit: type=1400 audit(1755057617.663:2407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.739547 kernel: audit: type=1400 audit(1755057617.663:2408): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.663000 audit: BPF prog-id=242 op=LOAD Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1711 pid=8237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:17.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373437663465633034646662666630356231303963373833306237 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1711 pid=8237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:17.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373437663465633034646662666630356231303963373833306237 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.666000 audit: BPF prog-id=243 op=LOAD Aug 13 04:00:17.666000 audit[8237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000220600 items=0 ppid=1711 pid=8237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:17.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373437663465633034646662666630356231303963373833306237 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit: BPF prog-id=244 op=LOAD Aug 13 04:00:17.671000 audit[8237]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000220648 items=0 ppid=1711 pid=8237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:17.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373437663465633034646662666630356231303963373833306237 Aug 13 04:00:17.671000 audit: BPF prog-id=244 op=UNLOAD Aug 13 04:00:17.671000 audit: BPF prog-id=243 op=UNLOAD Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { perfmon } for pid=8237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit[8237]: AVC avc: denied { bpf } for pid=8237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 04:00:17.671000 audit: BPF prog-id=245 op=LOAD Aug 13 04:00:17.671000 audit[8237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000220a58 items=0 ppid=1711 pid=8237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:17.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373437663465633034646662666630356231303963373833306237 Aug 13 04:00:17.831202 env[1201]: time="2025-08-13T04:00:17.831116645Z" level=info msg="StartContainer for \"30747f4ec04dfbff05b109c7830b7a1150b6c0c6e16cd0884ede1956a536f4a7\" returns successfully" Aug 13 04:00:18.955000 audit[8039]: AVC avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:18.955000 audit[8039]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0004178e0 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:18.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:18.963000 audit[8039]: AVC avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:18.963000 audit[8039]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00077f470 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:18.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:19.932005 sshd[8062]: pam_unix(sshd:session): session closed for user core Aug 13 04:00:19.945000 audit[8062]: USER_END pid=8062 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:19.947000 audit[8062]: CRED_DISP pid=8062 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:19.965996 systemd[1]: sshd@87-10.244.16.30:22-139.178.89.65:49376.service: Deactivated successfully. Aug 13 04:00:19.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-10.244.16.30:22-139.178.89.65:49376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:19.968444 systemd[1]: session-84.scope: Deactivated successfully. Aug 13 04:00:19.976307 systemd-logind[1192]: Session 84 logged out. Waiting for processes to exit. Aug 13 04:00:19.986030 systemd-logind[1192]: Removed session 84. Aug 13 04:00:25.086942 kernel: kauditd_printk_skb: 56 callbacks suppressed Aug 13 04:00:25.117824 kernel: audit: type=1130 audit(1755057625.078:2422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-10.244.16.30:22-139.178.89.65:59544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:25.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-10.244.16.30:22-139.178.89.65:59544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:25.078549 systemd[1]: Started sshd@88-10.244.16.30:22-139.178.89.65:59544.service. Aug 13 04:00:26.092000 audit[8312]: USER_ACCT pid=8312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:26.102036 kernel: audit: type=1101 audit(1755057626.092:2423): pid=8312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:26.102816 sshd[8312]: Accepted publickey for core from 139.178.89.65 port 59544 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 04:00:26.127529 kernel: audit: type=1103 audit(1755057626.102:2424): pid=8312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:26.127660 kernel: audit: type=1006 audit(1755057626.103:2425): pid=8312 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=85 res=1 Aug 13 04:00:26.127726 kernel: audit: type=1300 audit(1755057626.103:2425): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc26593440 a2=3 a3=0 items=0 ppid=1 pid=8312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:26.127790 kernel: audit: type=1327 audit(1755057626.103:2425): proctitle=737368643A20636F7265205B707269765D Aug 13 04:00:26.102000 audit[8312]: CRED_ACQ pid=8312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:26.103000 audit[8312]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc26593440 a2=3 a3=0 items=0 ppid=1 pid=8312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:26.103000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 04:00:26.124544 sshd[8312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 04:00:26.166350 systemd[1]: Started session-85.scope. Aug 13 04:00:26.166945 systemd-logind[1192]: New session 85 of user core. Aug 13 04:00:26.179000 audit[8312]: USER_START pid=8312 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:26.181000 audit[8314]: CRED_ACQ pid=8314 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:26.194454 kernel: audit: type=1105 audit(1755057626.179:2426): pid=8312 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:26.194644 kernel: audit: type=1103 audit(1755057626.181:2427): pid=8314 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:27.462271 sshd[8312]: pam_unix(sshd:session): session closed for user core Aug 13 04:00:27.468000 audit[8312]: USER_END pid=8312 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:27.480979 kernel: audit: type=1106 audit(1755057627.468:2428): pid=8312 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:27.480000 audit[8312]: CRED_DISP pid=8312 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:27.488995 kernel: audit: type=1104 audit(1755057627.480:2429): pid=8312 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:27.490427 systemd[1]: sshd@88-10.244.16.30:22-139.178.89.65:59544.service: Deactivated successfully. Aug 13 04:00:27.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-10.244.16.30:22-139.178.89.65:59544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:27.492910 systemd[1]: session-85.scope: Deactivated successfully. Aug 13 04:00:27.496120 systemd-logind[1192]: Session 85 logged out. Waiting for processes to exit. Aug 13 04:00:27.498157 systemd-logind[1192]: Removed session 85. Aug 13 04:00:28.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-10.244.16.30:22-193.46.255.20:45454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:28.187757 systemd[1]: Started sshd@89-10.244.16.30:22-193.46.255.20:45454.service. Aug 13 04:00:28.561730 sshd[8324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root Aug 13 04:00:28.561000 audit[8324]: USER_AUTH pid=8324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:30.294495 sshd[8324]: Failed password for root from 193.46.255.20 port 45454 ssh2 Aug 13 04:00:31.238000 audit[8324]: USER_AUTH pid=8324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:31.244810 kernel: kauditd_printk_skb: 3 callbacks suppressed Aug 13 04:00:31.245466 kernel: audit: type=1100 audit(1755057631.238:2433): pid=8324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:32.607794 systemd[1]: Started sshd@90-10.244.16.30:22-139.178.89.65:33662.service. Aug 13 04:00:32.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-10.244.16.30:22-139.178.89.65:33662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:32.616114 kernel: audit: type=1130 audit(1755057632.607:2434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-10.244.16.30:22-139.178.89.65:33662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:33.381396 sshd[8324]: Failed password for root from 193.46.255.20 port 45454 ssh2 Aug 13 04:00:33.533000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:33.533000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0081c1410 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 04:00:33.549802 kernel: audit: type=1400 audit(1755057633.533:2435): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:33.549955 kernel: audit: type=1300 audit(1755057633.533:2435): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0081c1410 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 04:00:33.533000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 04:00:33.555615 sshd[8327]: Accepted publickey for core from 139.178.89.65 port 33662 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 04:00:33.558002 kernel: audit: type=1327 audit(1755057633.533:2435): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 04:00:33.533000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:33.533000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c01ac160e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 04:00:33.567161 sshd[8327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 04:00:33.588962 kernel: audit: type=1400 audit(1755057633.533:2436): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:33.589218 kernel: audit: type=1300 audit(1755057633.533:2436): arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c01ac160e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 04:00:33.593606 kernel: audit: type=1327 audit(1755057633.533:2436): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 04:00:33.593682 kernel: audit: type=1400 audit(1755057633.546:2437): avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:33.593735 kernel: audit: type=1300 audit(1755057633.546:2437): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00883b3e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 04:00:33.533000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 04:00:33.546000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:33.546000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00883b3e0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 04:00:33.580543 systemd[1]: Started session-86.scope. Aug 13 04:00:33.582388 systemd-logind[1192]: New session 86 of user core. Aug 13 04:00:33.546000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 04:00:33.554000 audit[8327]: USER_ACCT pid=8327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:33.554000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:33.554000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c01ac16100 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 04:00:33.554000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 04:00:33.557000 audit[8327]: CRED_ACQ pid=8327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:33.557000 audit[8327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee5d92e50 a2=3 a3=0 items=0 ppid=1 pid=8327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:33.557000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 04:00:33.564000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:33.564000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0081c19b0 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 04:00:33.564000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 04:00:33.596000 audit[8327]: USER_START pid=8327 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:33.600000 audit[8329]: CRED_ACQ pid=8329 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:33.617000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:33.617000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0081c1a10 a2=fc6 a3=0 items=0 ppid=1684 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c607 key=(null) Aug 13 04:00:33.617000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31362E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Aug 13 04:00:33.915000 audit[8324]: USER_AUTH pid=8324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:34.626621 sshd[8327]: pam_unix(sshd:session): session closed for user core Aug 13 04:00:34.631000 audit[8327]: USER_END pid=8327 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:34.631000 audit[8327]: CRED_DISP pid=8327 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:34.634602 systemd[1]: sshd@90-10.244.16.30:22-139.178.89.65:33662.service: Deactivated successfully. Aug 13 04:00:34.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-10.244.16.30:22-139.178.89.65:33662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:34.636537 systemd[1]: session-86.scope: Deactivated successfully. Aug 13 04:00:34.638828 systemd-logind[1192]: Session 86 logged out. Waiting for processes to exit. Aug 13 04:00:34.642749 systemd-logind[1192]: Removed session 86. Aug 13 04:00:36.555000 audit[8039]: AVC avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:36.562772 kernel: kauditd_printk_skb: 21 callbacks suppressed Aug 13 04:00:36.562920 kernel: audit: type=1400 audit(1755057636.555:2450): avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:36.555000 audit[8039]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000caa8a0 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:36.555000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:36.593535 kernel: audit: type=1300 audit(1755057636.555:2450): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000caa8a0 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:36.593704 kernel: audit: type=1327 audit(1755057636.555:2450): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:36.593978 kernel: audit: type=1400 audit(1755057636.560:2451): avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:36.560000 audit[8039]: AVC avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:36.560000 audit[8039]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000caaa60 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:36.610241 kernel: audit: type=1300 audit(1755057636.560:2451): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000caaa60 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:36.560000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:36.560000 audit[8039]: AVC avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:36.624808 kernel: audit: type=1327 audit(1755057636.560:2451): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:36.625291 kernel: audit: type=1400 audit(1755057636.560:2452): avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:36.625495 kernel: audit: type=1300 audit(1755057636.560:2452): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000caac20 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:36.560000 audit[8039]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000caac20 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:36.560000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:36.640472 kernel: audit: type=1327 audit(1755057636.560:2452): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:36.640959 kernel: audit: type=1400 audit(1755057636.560:2453): avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:36.560000 audit[8039]: AVC avc: denied { watch } for pid=8039 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Aug 13 04:00:36.560000 audit[8039]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000caade0 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:36.560000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:36.666950 sshd[8324]: Failed password for root from 193.46.255.20 port 45454 ssh2 Aug 13 04:00:37.387000 audit[8039]: AVC avc: denied { watch } for pid=8039 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Aug 13 04:00:37.387000 audit[8039]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000872980 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:37.387000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:37.388000 audit[8039]: AVC avc: denied { watch } for pid=8039 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Aug 13 04:00:37.388000 audit[8039]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00194d130 a2=fc6 a3=0 items=0 ppid=1714 pid=8039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:37.388000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:37.805000 audit[8339]: AVC avc: denied { execute } for pid=8339 comm="kube-controller" name="uds" dev="vda9" ino=527075 scontext=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=0 Aug 13 04:00:37.805000 audit[8339]: SYSCALL arch=c000003e syscall=59 success=no exit=-13 a0=c001affd10 a1=c0015efda0 a2=c001595a00 a3=0 items=0 ppid=8039 pid=8339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c781,c870 key=(null) Aug 13 04:00:37.805000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Aug 13 04:00:38.828000 audit[8341]: NETFILTER_CFG table=filter:136 family=2 entries=33 op=nft_register_rule pid=8341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 04:00:38.828000 audit[8341]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc5d12f340 a2=0 a3=7ffc5d12f32c items=0 ppid=2131 pid=8341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:38.828000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 04:00:38.837000 audit[8341]: NETFILTER_CFG table=nat:137 family=2 entries=43 op=nft_register_chain pid=8341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 04:00:38.837000 audit[8341]: SYSCALL arch=c000003e syscall=46 success=yes exit=15580 a0=3 a1=7ffc5d12f340 a2=0 a3=7ffc5d12f32c items=0 ppid=2131 pid=8341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:38.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 04:00:38.874000 audit[8343]: NETFILTER_CFG table=filter:138 family=2 entries=32 op=nft_register_rule pid=8343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 04:00:38.874000 audit[8343]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdafb55190 a2=0 a3=7ffdafb5517c items=0 ppid=2131 pid=8343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:38.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 04:00:38.891000 audit[8343]: NETFILTER_CFG table=nat:139 family=2 entries=26 op=nft_register_rule pid=8343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 04:00:38.891000 audit[8343]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffdafb55190 a2=0 a3=0 items=0 ppid=2131 pid=8343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:38.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 04:00:39.238266 sshd[8324]: Received disconnect from 193.46.255.20 port 45454:11: [preauth] Aug 13 04:00:39.238266 sshd[8324]: Disconnected from authenticating user root 193.46.255.20 port 45454 [preauth] Aug 13 04:00:39.244101 sshd[8324]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root Aug 13 04:00:39.271735 systemd[1]: sshd@89-10.244.16.30:22-193.46.255.20:45454.service: Deactivated successfully. Aug 13 04:00:39.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-10.244.16.30:22-193.46.255.20:45454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:39.314096 systemd[1]: Started sshd@91-10.244.16.30:22-193.46.255.20:56640.service. Aug 13 04:00:39.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-10.244.16.30:22-193.46.255.20:56640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:39.670000 audit[8348]: USER_AUTH pid=8348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:39.670907 sshd[8348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root Aug 13 04:00:39.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-10.244.16.30:22-139.178.89.65:48190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:39.771722 systemd[1]: Started sshd@92-10.244.16.30:22-139.178.89.65:48190.service. Aug 13 04:00:40.694000 audit[8351]: USER_ACCT pid=8351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:40.696000 audit[8351]: CRED_ACQ pid=8351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:40.696000 audit[8351]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe018897d0 a2=3 a3=0 items=0 ppid=1 pid=8351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:40.696000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 04:00:40.743404 sshd[8351]: Accepted publickey for core from 139.178.89.65 port 48190 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 04:00:40.721881 sshd[8351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 04:00:40.796516 systemd-logind[1192]: New session 87 of user core. Aug 13 04:00:40.798070 systemd[1]: Started session-87.scope. Aug 13 04:00:40.816000 audit[8351]: USER_START pid=8351 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:40.819000 audit[8357]: CRED_ACQ pid=8357 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:41.577395 sshd[8348]: Failed password for root from 193.46.255.20 port 56640 ssh2 Aug 13 04:00:42.370408 kernel: kauditd_printk_skb: 34 callbacks suppressed Aug 13 04:00:42.396983 kernel: audit: type=2100 audit(1755057642.358:2470): pid=8348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:42.405332 kernel: audit: type=1100 audit(1755057642.363:2471): pid=8348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:42.358000 audit[8348]: ANOM_LOGIN_FAILURES pid=8348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:42.363000 audit[8348]: USER_AUTH pid=8348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:42.359633 sshd[8348]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Aug 13 04:00:42.729233 sshd[8351]: pam_unix(sshd:session): session closed for user core Aug 13 04:00:42.801000 audit[8351]: USER_END pid=8351 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:42.820670 kernel: audit: type=1106 audit(1755057642.801:2472): pid=8351 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:42.814000 audit[8351]: CRED_DISP pid=8351 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:42.836645 kernel: audit: type=1104 audit(1755057642.814:2473): pid=8351 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:42.843983 systemd[1]: sshd@92-10.244.16.30:22-139.178.89.65:48190.service: Deactivated successfully. Aug 13 04:00:42.869464 kernel: audit: type=1131 audit(1755057642.854:2474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-10.244.16.30:22-139.178.89.65:48190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:42.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-10.244.16.30:22-139.178.89.65:48190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:42.867589 systemd[1]: session-87.scope: Deactivated successfully. Aug 13 04:00:42.875981 systemd-logind[1192]: Session 87 logged out. Waiting for processes to exit. Aug 13 04:00:42.890384 systemd-logind[1192]: Removed session 87. Aug 13 04:00:44.721146 sshd[8348]: Failed password for root from 193.46.255.20 port 56640 ssh2 Aug 13 04:00:45.050000 audit[8348]: USER_AUTH pid=8348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:45.085650 kernel: audit: type=1100 audit(1755057645.050:2475): pid=8348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:46.453000 audit[8426]: NETFILTER_CFG table=filter:140 family=2 entries=20 op=nft_register_rule pid=8426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 04:00:46.630781 kernel: audit: type=1325 audit(1755057646.453:2476): table=filter:140 family=2 entries=20 op=nft_register_rule pid=8426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 04:00:46.636294 kernel: audit: type=1300 audit(1755057646.453:2476): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff0744d690 a2=0 a3=7fff0744d67c items=0 ppid=2131 pid=8426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:46.636435 kernel: audit: type=1327 audit(1755057646.453:2476): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 04:00:46.639296 kernel: audit: type=1325 audit(1755057646.484:2477): table=nat:141 family=2 entries=110 op=nft_register_chain pid=8426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 04:00:46.453000 audit[8426]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff0744d690 a2=0 a3=7fff0744d67c items=0 ppid=2131 pid=8426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:46.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 04:00:46.484000 audit[8426]: NETFILTER_CFG table=nat:141 family=2 entries=110 op=nft_register_chain pid=8426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 04:00:46.484000 audit[8426]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7fff0744d690 a2=0 a3=7fff0744d67c items=0 ppid=2131 pid=8426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:46.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 04:00:46.714000 audit[4684]: AVC avc: denied { watch } for pid=4684 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.1258253586/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1003,c1023 tclass=file permissive=0 Aug 13 04:00:46.714000 audit[4684]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eb5f80 a2=fc6 a3=0 items=0 ppid=3735 pid=4684 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1003,c1023 key=(null) Aug 13 04:00:46.714000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 04:00:47.817066 sshd[8348]: Failed password for root from 193.46.255.20 port 56640 ssh2 Aug 13 04:00:47.957303 systemd[1]: Started sshd@93-10.244.16.30:22-139.178.89.65:48196.service. Aug 13 04:00:47.997978 kernel: kauditd_printk_skb: 5 callbacks suppressed Aug 13 04:00:48.001499 kernel: audit: type=1130 audit(1755057647.964:2479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-10.244.16.30:22-139.178.89.65:48196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:47.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-10.244.16.30:22-139.178.89.65:48196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:48.157370 kubelet[1983]: E0813 04:00:48.151715 1983 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.083s" Aug 13 04:00:49.044000 audit[8429]: USER_ACCT pid=8429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:49.122045 kernel: audit: type=1101 audit(1755057649.044:2480): pid=8429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:49.128042 kernel: audit: type=1103 audit(1755057649.100:2481): pid=8429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:49.128153 kernel: audit: type=1006 audit(1755057649.100:2482): pid=8429 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=88 res=1 Aug 13 04:00:49.128232 kernel: audit: type=1300 audit(1755057649.100:2482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3409910 a2=3 a3=0 items=0 ppid=1 pid=8429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:49.128310 kernel: audit: type=1327 audit(1755057649.100:2482): proctitle=737368643A20636F7265205B707269765D Aug 13 04:00:49.100000 audit[8429]: CRED_ACQ pid=8429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:49.100000 audit[8429]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3409910 a2=3 a3=0 items=0 ppid=1 pid=8429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 04:00:49.100000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 04:00:49.182572 sshd[8429]: Accepted publickey for core from 139.178.89.65 port 48196 ssh2: RSA SHA256:IhAXCeSjxrdQ+RldUaiR6Aj3Gfh8Tjc1MdmRZxX3OLE Aug 13 04:00:49.105144 sshd[8429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 04:00:49.208582 systemd-logind[1192]: New session 88 of user core. Aug 13 04:00:49.211547 systemd[1]: Started session-88.scope. Aug 13 04:00:49.239000 audit[8429]: USER_START pid=8429 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:49.252454 kernel: audit: type=1105 audit(1755057649.239:2483): pid=8429 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:49.258000 audit[8433]: CRED_ACQ pid=8433 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:49.268973 kernel: audit: type=1103 audit(1755057649.258:2484): pid=8433 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:00:50.357516 sshd[8348]: Received disconnect from 193.46.255.20 port 56640:11: [preauth] Aug 13 04:00:50.357516 sshd[8348]: Disconnected from authenticating user root 193.46.255.20 port 56640 [preauth] Aug 13 04:00:50.443345 kernel: audit: type=1131 audit(1755057650.430:2485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-10.244.16.30:22-193.46.255.20:56640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:50.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-10.244.16.30:22-193.46.255.20:56640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:50.366711 sshd[8348]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root Aug 13 04:00:50.428310 systemd[1]: sshd@91-10.244.16.30:22-193.46.255.20:56640.service: Deactivated successfully. Aug 13 04:00:50.468966 kernel: audit: type=1130 audit(1755057650.461:2486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-10.244.16.30:22-193.46.255.20:46526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:50.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-10.244.16.30:22-193.46.255.20:46526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:50.460607 systemd[1]: Started sshd@94-10.244.16.30:22-193.46.255.20:46526.service. Aug 13 04:00:50.912000 audit[8442]: USER_AUTH pid=8442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:50.913532 sshd[8442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root Aug 13 04:00:52.685969 sshd[8442]: Failed password for root from 193.46.255.20 port 46526 ssh2 Aug 13 04:00:53.652050 kernel: kauditd_printk_skb: 1 callbacks suppressed Aug 13 04:00:53.712722 kernel: audit: type=1100 audit(1755057653.641:2488): pid=8442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:53.641000 audit[8442]: USER_AUTH pid=8442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:55.842089 sshd[8442]: Failed password for root from 193.46.255.20 port 46526 ssh2 Aug 13 04:00:55.948997 kernel: audit: type=1400 audit(1755057655.884:2489): avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 04:00:55.951509 kernel: audit: type=1300 audit(1755057655.884:2489): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002952b00 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 04:00:55.951596 kernel: audit: type=1327 audit(1755057655.884:2489): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 04:00:55.884000 audit[4862]: AVC avc: denied { watch } for pid=4862 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_03_48_15.2313258785/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c980 tclass=file permissive=0 Aug 13 04:00:55.884000 audit[4862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002952b00 a2=fc6 a3=0 items=0 ppid=3949 pid=4862 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c980 key=(null) Aug 13 04:00:55.884000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Aug 13 04:00:56.314000 audit[8442]: USER_AUTH pid=8442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:56.331416 kernel: audit: type=1100 audit(1755057656.314:2490): pid=8442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.20 addr=193.46.255.20 terminal=ssh res=failed' Aug 13 04:00:58.297474 kubelet[1983]: E0813 04:00:58.295354 1983 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="2.51s" Aug 13 04:00:58.900101 sshd[8442]: Failed password for root from 193.46.255.20 port 46526 ssh2 Aug 13 04:00:58.967087 sshd[8442]: Received disconnect from 193.46.255.20 port 46526:11: [preauth] Aug 13 04:00:58.967087 sshd[8442]: Disconnected from authenticating user root 193.46.255.20 port 46526 [preauth] Aug 13 04:00:58.970564 sshd[8442]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root Aug 13 04:00:59.017378 systemd[1]: sshd@94-10.244.16.30:22-193.46.255.20:46526.service: Deactivated successfully. Aug 13 04:00:59.034143 kernel: audit: type=1131 audit(1755057659.020:2491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-10.244.16.30:22-193.46.255.20:46526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:00:59.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-10.244.16.30:22-193.46.255.20:46526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:01:00.871088 sshd[8429]: pam_unix(sshd:session): session closed for user core Aug 13 04:01:00.974646 kernel: audit: type=1106 audit(1755057660.909:2492): pid=8429 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:01:00.978576 kernel: audit: type=1104 audit(1755057660.909:2493): pid=8429 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:01:00.979207 kernel: audit: type=1131 audit(1755057660.960:2494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-10.244.16.30:22-139.178.89.65:48196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:01:00.909000 audit[8429]: USER_END pid=8429 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:01:00.909000 audit[8429]: CRED_DISP pid=8429 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 04:01:00.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-10.244.16.30:22-139.178.89.65:48196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 04:01:00.958946 systemd[1]: sshd@93-10.244.16.30:22-139.178.89.65:48196.service: Deactivated successfully. Aug 13 04:01:00.962008 systemd[1]: session-88.scope: Deactivated successfully. Aug 13 04:01:00.962239 systemd[1]: session-88.scope: Consumed 3.179s CPU time. Aug 13 04:01:00.969323 systemd-logind[1192]: Session 88 logged out. Waiting for processes to exit. Aug 13 04:01:00.981497 systemd-logind[1192]: Removed session 88. Aug 13 04:01:01.167283 kubelet[1983]: E0813 04:01:01.164127 1983 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.997s"