-oem.mount. [ OK ] Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@efi_pstore.service. [ OK ] Finished modprobe@loop.service. [ OK ] Finished systemd-sysext.service. Starting ensure-sysext.service... Starting systemd-tmpfiles-setup.service... [ OK ] Finished systemd-networkd-wait-online.service. [ OK ] Finished systemd-tmpfiles-setup.service. Starting audit-rules.service... Starting clean-ca-certificates.service... Starting systemd-journal-catalog-update.service... Starting systemd-resolved.service... Starting systemd-timesyncd.service... Starting systemd-update-utmp.service... Starting modprobe@dm_mod.service... Starting modprobe@efi_pstore.service... Starting modprobe@loop.service... [ OK ] Finished modprobe@dm_mod.service. Starting modprobe@dm_mod.service... [ OK ] Finished clean-ca-certificates.service. [ OK ] Finished modprobe@efi_pstore.service. Starting modprobe@drm.service... [ OK ] Finished ensure-sysext.service. [ OK ] Finished systemd-update-utmp.service. [ OK ] Finished modprobe@drm.service. [ OK ] Finished modprobe@loop.service. [ OK ] Finished modprobe@dm_mod.service. [ OK ] Finished systemd-journal-catalog-update.service. [ OK ] Finished audit-rules.service. [ OK ] Started systemd-timesyncd.service. [ OK ] Reached target time-set.target. [ OK ] Started systemd-resolved.service. [ OK ] Reached target network.target. [ OK ] Reached target network-online.target. [ OK ] Reached target nss-lookup.target. [ OK ] Finished ldconfig.service. Starting systemd-update-done.service... [ OK ] Finished systemd-update-done.service. [ OK ] Reached target sysinit.target. [ OK ] Started motdgen.path. [ OK ] Started user-cloudinit@var…car\x2dinstall-user_data.path. [ OK ] Started logrotate.timer. [ OK ] Started mdadm.timer. [ OK ] Started systemd-tmpfiles-clean.timer. [ OK ] Reached target paths.target. [ OK ] Reached target timers.target. [ OK ] Listening on dbus.socket. Starting docker.socket... [ OK ] Listening on sshd.socket. [ OK ] Listening on docker.socket. [ OK ] Reached target sockets.target. [ OK ] Reached target basic.target. [ OK ] Started amazon-ssm-agent.service. Starting containerd.service... Starting coreos-metadata-sshkeys@core.service... Starting dbus.service... Starting enable-oem-cloudinit.service... Starting extend-filesystems.service... Starting kubelet.service... Starting motdgen.service... [ OK ] Started nvidia.service. Starting prepare-helm.service... Starting ssh-key-proc-cmdline.service... Starting sshd-keygen.service... Starting systemd-logind.service... Starting update-engine.service... Starting update-ssh-keys-after-ignition.service... [ OK ] Finished ssh-key-proc-cmdline.service. [ 19.641082] extend-filesystems[1801]: Found loop1 [ 19.642724] extend-filesystems[1801]: Found nvme0n1 [ 19.649543] extend-filesystems[1801]: Found nvme0n1p1 [ 19.654450] extend-filesystems[1801]: Found nvme0n1p2 [ 19.656214] extend-filesystems[1801]: Found nvme0n1p3 [ 19.658669] extend-filesystems[1801]: Found usr [ 19.660305] extend-filesystems[1801]: Found nvme0n1p4 [ 19.662016] extend-filesystems[1801]: Found nvme0n1p6 [ 19.669151] extend-filesystems[1801]: Found nvme0n1p7 [ 19.671097] extend-filesystems[1801]: Found nvme0n1p9 [ 19.672766] extend-filesystems[1801]: Checking size of /dev/nvme0n1p9 [ OK ] Finished motdgen.service. [ OK ] Started dbus.service. [ OK ] Reached target system-config.target. [ OK ] Reached target user-config.target. [ 19.787542] extend-filesystems[1801]: Resized partition /dev/nvme0n1p9 Starting systemd-hostnamed.service... [ 19.819796] extend-filesystems[1858]: resize2fs 1.46.5 (30-Dec-2021) [ 19.987161] EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks [ 20.104978] EXT4-fs (nvme0n1p9): resized filesystem to 1489915 [ OK ] Finished update-ssh-keys-after-ignition.service. [ 19.976152] extend-filesystems[1858]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required [ OK ] Finished extend-filesystems.service. [ 19.988818] extend-filesystems[1858]: old_desc_blocks = 1, new_desc_blocks = 1 [ 19.991634] extend-filesystems[1858]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. [ 19.996390] extend-filesystems[1801]: Resized filesystem in /dev/nvme0n1p9 [ OK ] Started update-engine.service. [ OK ] Started locksmithd.service. [ OK ] Started systemd-logind.service. [ OK ] Started systemd-hostnamed.service. Starting polkit.service... [ OK ] Started polkit.service. [ OK ] Started containerd.service. [ OK ] Finished coreos-metadata-sshkeys@core.service. 2025/08/13 00:01:50Z: Amazon SSM Agent v2.3.1319.0 is running 2025/08/13 00:01:50Z: OsProductName: Flatcar Container Linux by Kinvolk 2025/08/13 00:01:50Z: OsVersion: 3510.3.8 [ OK ] Finished prepare-helm.service. [ OK ] Started kubelet.service. [ OK ] Finished sshd-keygen.service. Starting issuegen.service... [ OK ] Finished issuegen.service. Starting systemd-user-sessions.service... [ OK ] Finished systemd-user-sessions.service. [ OK ] Started getty@tty1.service. [ OK ] Started serial-getty@ttyS0.service. [ OK ] Reached target getty.target. [ OK ] Reached target multi-user.target. Starting systemd-update-utmp-runlevel.service... [ OK ] Finished systemd-update-utmp-runlevel.service. This is ip-172-31-16-74 (Linux aarch64 5.15.189-flatcar) 00:01:55 SSH host key: SHA256:w98nr7Rj2Ol4y5Th1bUVgeWkL5kJOpX01filf3TnBeo (ECDSA) SSH host key: SHA256:tWo0FA5MuewrmzW2dRMK82bn5TE3eMB9Z6AKAL26Q+g (RSA) SSH host key: SHA256:lOuE48JRwfXv5d0AAK37A1Mf0krd19eJ5ki9lu5N4SY (ED25519) eth0: 172.31.16.74 fe80::4d7:44ff:fe6a:d36d ip-172-31-16-74 login: [ 30.404909] kauditd_printk_skb: 92 callbacks suppressed [ 30.404914] audit: type=1305 audit(1755043319.630:200): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 30.412380] audit: type=1300 audit(1755043319.630:200): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff55d6d20 a2=420 a3=0 items=0 ppid=1 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 30.427324] audit: type=1327 audit(1755043319.630:200): proctitle=2F7362696E2F617564697463746C002D44 [ 30.431508] audit: type=1131 audit(1755043319.633:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 30.463928] audit: type=1130 audit(1755043319.688:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 30.472767] audit: type=1106 audit(1755043319.698:203): pid=2066 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 30.482856] audit: type=1104 audit(1755043319.698:204): pid=2066 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 30.506371] audit: type=1106 audit(1755043319.732:205): pid=2063 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 30.518930] audit: type=1104 audit(1755043319.732:206): pid=2063 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 30.529474] audit: type=1131 audit(1755043319.744:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.16.74:22-139.178.89.65:60842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 31.395052] Initializing XFRM netlink socket This is ip-172-31-16-74 (Linux aarch64 5.15.189-flatcar) 00:02:01 SSH host key: SHA256:w98nr7Rj2Ol4y5Th1bUVgeWkL5kJOpX01filf3TnBeo (ECDSA) SSH host key: SHA256:tWo0FA5MuewrmzW2dRMK82bn5TE3eMB9Z6AKAL26Q+g (RSA) SSH host key: SHA256:lOuE48JRwfXv5d0AAK37A1Mf0krd19eJ5ki9lu5N4SY (ED25519) eth0: 172.31.16.74 fe80::4d7:44ff:fe6a:d36d ip-172-31-16-74 login: [ 44.453631] kauditd_printk_skb: 88 callbacks suppressed [ 44.453636] audit: type=1130 audit(1755043333.669:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 44.464871] audit: type=1131 audit(1755043333.669:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 44.794992] audit: type=1130 audit(1755043334.009:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 44.873301] audit: type=1131 audit(1755043334.088:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 50.625580] audit: type=1131 audit(1755043339.839:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 50.658440] audit: type=1334 audit(1755043339.872:251): prog-id=43 op=UNLOAD [ 50.661406] audit: type=1334 audit(1755043339.872:252): prog-id=42 op=UNLOAD [ 50.664559] audit: type=1334 audit(1755043339.872:253): prog-id=41 op=UNLOAD [ 54.957890] audit: type=1130 audit(1755043344.169:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 54.974661] audit: type=1131 audit(1755043344.169:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 55.271235] audit: type=1130 audit(1755043344.483:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 55.370388] audit: type=1131 audit(1755043344.582:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 61.012325] audit: type=1130 audit(1755043350.223:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 61.021416] audit: type=1131 audit(1755043350.227:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 61.708245] audit: type=1400 audit(1755043350.919:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.716124] audit: type=1400 audit(1755043350.919:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.724122] audit: type=1400 audit(1755043350.919:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.731961] audit: type=1400 audit(1755043350.919:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.739988] audit: type=1400 audit(1755043350.919:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.747952] audit: audit_backlog=65 > audit_backlog_limit=64 [ 61.748158] audit: type=1400 audit(1755043350.919:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.750266] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 66.200289] kauditd_printk_skb: 388 callbacks suppressed [ 66.200294] audit: type=1400 audit(1755043355.411:503): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 66.215303] audit: type=1400 audit(1755043355.420:504): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 66.225994] audit: type=1400 audit(1755043355.420:505): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 66.236616] audit: type=1400 audit(1755043355.420:506): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 66.246660] audit: type=1400 audit(1755043355.420:507): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 66.257460] audit: type=1400 audit(1755043355.420:508): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 66.270422] audit: audit_backlog=65 > audit_backlog_limit=64 [ 66.271929] audit: type=1400 audit(1755043355.420:509): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 66.273364] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 66.286264] audit: backlog limit exceeded [ 73.834368] kauditd_printk_skb: 187 callbacks suppressed [ 73.834373] audit: type=1400 audit(1755043363.044:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 73.844602] audit: type=1400 audit(1755043363.047:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 73.853409] audit: type=1400 audit(1755043363.047:566): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 73.863343] audit: type=1400 audit(1755043363.047:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 73.873666] audit: type=1400 audit(1755043363.047:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 73.881736] audit: type=1400 audit(1755043363.047:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 73.884122] audit: audit_backlog=65 > audit_backlog_limit=64 [ 73.892174] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 73.893398] audit: type=1400 audit(1755043363.047:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 73.895175] audit: backlog limit exceeded [ 79.408636] kauditd_printk_skb: 279 callbacks suppressed [ 79.408641] audit: type=1400 audit(1755043368.618:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.422630] audit: type=1400 audit(1755043368.618:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.434362] audit: type=1400 audit(1755043368.618:812): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.444898] audit: type=1400 audit(1755043368.618:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.453780] audit: type=1400 audit(1755043368.618:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.462458] audit: type=1400 audit(1755043368.618:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.474219] audit: type=1400 audit(1755043368.618:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.485095] audit: type=1400 audit(1755043368.618:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.494636] audit: type=1400 audit(1755043368.618:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.504354] audit: type=1400 audit(1755043368.620:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 91.742650] kauditd_printk_skb: 357 callbacks suppressed [ 91.742656] audit: type=1106 audit(1755043380.951:921): pid=2096 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 91.758571] audit: type=1104 audit(1755043380.952:922): pid=2096 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 91.785525] audit: type=1106 audit(1755043380.992:923): pid=2093 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 91.808529] audit: type=1104 audit(1755043380.992:924): pid=2093 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 91.821777] audit: type=1131 audit(1755043381.013:925): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.74:22-139.178.89.65:60844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 96.740609] audit: type=1325 audit(1755043385.950:926): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 96.748121] audit: type=1300 audit(1755043385.950:926): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffeed8a9f0 a2=0 a3=1 items=0 ppid=3010 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 96.761464] audit: type=1327 audit(1755043385.950:926): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 96.775053] audit: type=1325 audit(1755043385.984:927): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 96.782634] audit: type=1300 audit(1755043385.984:927): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffeed8a9f0 a2=0 a3=1 items=0 ppid=3010 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 96.796114] audit: type=1327 audit(1755043385.984:927): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 96.832941] audit: type=1325 audit(1755043386.042:928): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 96.840606] audit: type=1300 audit(1755043386.042:928): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffecfdbf20 a2=0 a3=1 items=0 ppid=3010 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 96.853121] audit: type=1327 audit(1755043386.042:928): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 96.859412] audit: type=1325 audit(1755043386.051:929): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 96.865644] audit: type=1300 audit(1755043386.051:929): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffecfdbf20 a2=0 a3=1 items=0 ppid=3010 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 102.916028] kauditd_printk_skb: 133 callbacks suppressed [ 102.916033] audit: type=1400 audit(1755043392.125:972): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 102.929486] audit: type=1400 audit(1755043392.125:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 102.938149] audit: type=1400 audit(1755043392.128:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 102.948090] audit: type=1400 audit(1755043392.128:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 102.959476] audit: type=1400 audit(1755043392.128:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 102.967563] audit: type=1400 audit(1755043392.128:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 102.975749] audit: type=1400 audit(1755043392.128:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 102.983895] audit: type=1400 audit(1755043392.128:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 102.993165] audit: type=1400 audit(1755043392.128:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 103.007320] audit: type=1400 audit(1755043392.136:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 108.942946] kauditd_printk_skb: 91 callbacks suppressed [ 108.942951] audit: type=1400 audit(1755043398.152:997): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 108.953356] audit: type=1300 audit(1755043398.152:997): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3355 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 108.965915] audit: type=1327 audit(1755043398.152:997): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532353963616665346132666638376132646133633539363861636330 [ 108.978055] audit: type=1400 audit(1755043398.152:998): avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 108.986475] audit: type=1400 audit(1755043398.152:998): avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 108.994784] audit: type=1400 audit(1755043398.152:998): avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 109.002746] audit: type=1400 audit(1755043398.152:998): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 109.012383] audit: type=1400 audit(1755043398.152:998): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 109.021897] audit: type=1400 audit(1755043398.152:998): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 109.030407] audit: type=1400 audit(1755043398.152:998): avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 119.818173] kauditd_printk_skb: 40 callbacks suppressed [ 119.818179] audit: type=1400 audit(1755043409.027:1006): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 119.829707] audit: type=1300 audit(1755043409.027:1006): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3355 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 119.842964] audit: type=1327 audit(1755043409.027:1006): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616161633934313164653539663361303037346238366334353563 [ 119.854000] audit: type=1400 audit(1755043409.028:1007): avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 119.873793] audit: type=1400 audit(1755043409.028:1007): avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 119.882528] audit: type=1400 audit(1755043409.028:1007): avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 119.891729] audit: type=1400 audit(1755043409.028:1007): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 119.900431] audit: type=1400 audit(1755043409.028:1007): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 119.909488] audit: type=1400 audit(1755043409.028:1007): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 119.920579] audit: type=1400 audit(1755043409.028:1007): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.341052] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 120.344095] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. [ 121.864711] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 121.867387] IPv6: ADDRCONF(NETDEV_CHANGE): cali42d2d3d9a2a: link becomes ready [ 123.903870] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 123.906408] IPv6: ADDRCONF(NETDEV_CHANGE): cali33edb6a0137: link becomes ready [ 124.100591] IPv6: ADDRCONF(NETDEV_CHANGE): calief172acb4cb: link becomes ready This is ip-172-31-16-74 (Linux aarch64 5.15.189-flatcar) 00:03:33 SSH host key: SHA256:w98nr7Rj2Ol4y5Th1bUVgeWkL5kJOpX01filf3TnBeo (ECDSA) SSH host key: SHA256:tWo0FA5MuewrmzW2dRMK82bn5TE3eMB9Z6AKAL26Q+g (RSA) SSH host key: SHA256:lOuE48JRwfXv5d0AAK37A1Mf0krd19eJ5ki9lu5N4SY (ED25519) eth0: 172.31.16.74 fe80::4d7:44ff:fe6a:d36d ip-172-31-16-74 login: [ 124.311899] IPv6: ADDRCONF(NETDEV_CHANGE): cali83290fd40a8: link becomes ready [ 124.888378] kauditd_printk_skb: 377 callbacks suppressed [ 124.888383] audit: type=1400 audit(1755043414.098:1104): avc: denied { bpf } for pid=4438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 124.906265] audit: type=1400 audit(1755043414.098:1104): avc: denied { bpf } for pid=4438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 124.921171] audit: type=1400 audit(1755043414.098:1104): avc: denied { perfmon } for pid=4438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 124.931117] audit: type=1400 audit(1755043414.098:1104): avc: denied { perfmon } for pid=4438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 124.946898] audit: type=1400 audit(1755043414.098:1104): avc: denied { perfmon } for pid=4438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 124.958584] audit: type=1400 audit(1755043414.098:1104): avc: denied { perfmon } for pid=4438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 124.974426] audit: type=1400 audit(1755043414.098:1104): avc: denied { perfmon } for pid=4438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 124.990170] audit: type=1400 audit(1755043414.098:1104): avc: denied { bpf } for pid=4438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 125.006310] audit: type=1400 audit(1755043414.098:1104): avc: denied { bpf } for pid=4438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 125.014311] audit: audit_backlog=65 > audit_backlog_limit=64 This is ip-172-31-16-74 (Linux aarch64 5.15.189-flatcar) 00:03:35 SSH host key: SHA256:w98nr7Rj2Ol4y5Th1bUVgeWkL5kJOpX01filf3TnBeo (ECDSA) SSH host key: SHA256:tWo0FA5MuewrmzW2dRMK82bn5TE3eMB9Z6AKAL26Q+g (RSA) SSH host key: SHA256:lOuE48JRwfXv5d0AAK37A1Mf0krd19eJ5ki9lu5N4SY (ED25519) eth0: 172.31.16.74 fe80::4d7:44ff:fe6a:d36d ip-172-31-16-74 login: [ 126.971685] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 126.974208] IPv6: ADDRCONF(NETDEV_CHANGE): calic21c7146b09: link becomes ready This is ip-172-31-16-74 (Linux aarch64 5.15.189-flatcar) 00:03:36 SSH host key: SHA256:w98nr7Rj2Ol4y5Th1bUVgeWkL5kJOpX01filf3TnBeo (ECDSA) SSH host key: SHA256:tWo0FA5MuewrmzW2dRMK82bn5TE3eMB9Z6AKAL26Q+g (RSA) SSH host key: SHA256:lOuE48JRwfXv5d0AAK37A1Mf0krd19eJ5ki9lu5N4SY (ED25519) eth0: 172.31.16.74 fe80::4d7:44ff:fe6a:d36d [ 127.131975] IPv6: ADDRCONF(NETDEV_CHANGE): cali30e2c963e85: link becomes ready ip-172-31-16-74 login: [ 127.310097] IPv6: ADDRCONF(NETDEV_CHANGE): cali8b437bd9218: link becomes ready This is ip-172-31-16-74 (Linux aarch64 5.15.189-flatcar) 00:03:37 SSH host key: SHA256:w98nr7Rj2Ol4y5Th1bUVgeWkL5kJOpX01filf3TnBeo (ECDSA) SSH host key: SHA256:tWo0FA5MuewrmzW2dRMK82bn5TE3eMB9Z6AKAL26Q+g (RSA) SSH host key: SHA256:lOuE48JRwfXv5d0AAK37A1Mf0krd19eJ5ki9lu5N4SY (ED25519) eth0: 172.31.16.74 fe80::4d7:44ff:fe6a:d36d ip-172-31-16-74 login: [ 128.606146] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 128.608642] IPv6: ADDRCONF(NETDEV_CHANGE): calife9916cbcd4: link becomes ready This is ip-172-31-16-74 (Linux aarch64 5.15.189-flatcar) 00:03:38 SSH host key: SHA256:w98nr7Rj2Ol4y5Th1bUVgeWkL5kJOpX01filf3TnBeo (ECDSA) SSH host key: SHA256:tWo0FA5MuewrmzW2dRMK82bn5TE3eMB9Z6AKAL26Q+g (RSA) SSH host key: SHA256:lOuE48JRwfXv5d0AAK37A1Mf0krd19eJ5ki9lu5N4SY (ED25519) eth0: 172.31.16.74 fe80::4d7:44ff:fe6a:d36d ip-172-31-16-74 login: [ 130.006715] kauditd_printk_skb: 917 callbacks suppressed [ 130.006720] audit: type=1400 audit(1755043419.216:1339): avc: denied { watch } for pid=2771 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c433 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 130.019391] audit: type=1400 audit(1755043419.224:1340): avc: denied { watch } for pid=2771 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c433 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 130.029582] audit: type=1300 audit(1755043419.224:1340): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400261e600 a2=fc6 a3=0 items=0 ppid=2524 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c433 key=(null) [ 130.043515] audit: type=1327 audit(1755043419.224:1340): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 130.054973] audit: type=1300 audit(1755043419.216:1339): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000a1d350 a2=fc6 a3=0 items=0 ppid=2524 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c433 key=(null) [ 130.069831] audit: type=1327 audit(1755043419.216:1339): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 130.100500] audit: type=1400 audit(1755043419.310:1341): avc: denied { watch } for pid=2751 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c889 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 130.111839] audit: type=1400 audit(1755043419.311:1342): avc: denied { watch } for pid=2751 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c889 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 130.125814] audit: type=1300 audit(1755043419.311:1342): arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400d7171d0 a2=fc6 a3=0 items=0 ppid=2528 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c579,c889 key=(null) [ 130.140214] audit: type=1327 audit(1755043419.311:1342): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 This is ip-172-31-16-74 (Linux aarch64 5.15.189-flatcar) 00:03:39 SSH host key: SHA256:w98nr7Rj2Ol4y5Th1bUVgeWkL5kJOpX01filf3TnBeo (ECDSA) SSH host key: SHA256:tWo0FA5MuewrmzW2dRMK82bn5TE3eMB9Z6AKAL26Q+g (RSA) SSH host key: SHA256:lOuE48JRwfXv5d0AAK37A1Mf0krd19eJ5ki9lu5N4SY (ED25519) eth0: 172.31.16.74 fe80::4d7:44ff:fe6a:d36d ip-172-31-16-74 login: This is ip-172-31-16-74 (Linux aarch64 5.15.189-flatcar) 00:03:40 SSH host key: SHA256:w98nr7Rj2Ol4y5Th1bUVgeWkL5kJOpX01filf3TnBeo (ECDSA) SSH host key: SHA256:tWo0FA5MuewrmzW2dRMK82bn5TE3eMB9Z6AKAL26Q+g (RSA) SSH host key: SHA256:lOuE48JRwfXv5d0AAK37A1Mf0krd19eJ5ki9lu5N4SY (ED25519) eth0: 172.31.16.74 fe80::4d7:44ff:fe6a:d36d ip-172-31-16-74 login: [ 135.445377] kauditd_printk_skb: 82 callbacks suppressed [ 135.445382] audit: type=1400 audit(1755043424.655:1374): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.456194] audit: type=1400 audit(1755043424.655:1375): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.464336] audit: type=1400 audit(1755043424.655:1376): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.480018] audit: type=1400 audit(1755043424.655:1377): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.494377] audit: type=1400 audit(1755043424.655:1378): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.504972] audit: type=1400 audit(1755043424.655:1379): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.515411] audit: type=1400 audit(1755043424.655:1380): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.525339] audit: type=1400 audit(1755043424.655:1381): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.534939] audit: type=1400 audit(1755043424.655:1382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 135.545154] audit: type=1400 audit(1755043424.657:1383): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.500228] kauditd_printk_skb: 130 callbacks suppressed [ 140.500234] audit: type=1106 audit(1755043429.708:1422): pid=5711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 140.521762] audit: type=1104 audit(1755043429.708:1423): pid=5711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 140.531744] audit: type=1131 audit(1755043429.726:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.16.74:22-139.178.89.65:41914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 141.537196] audit: type=1325 audit(1755043430.743:1425): table=filter:118 family=2 entries=12 op=nft_register_rule pid=5767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 141.547728] audit: type=1300 audit(1755043430.743:1425): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffc91edb20 a2=0 a3=1 items=0 ppid=3010 pid=5767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 141.561483] audit: type=1327 audit(1755043430.743:1425): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 141.570459] audit: type=1325 audit(1755043430.779:1426): table=nat:119 family=2 entries=22 op=nft_register_rule pid=5767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 141.578905] audit: type=1300 audit(1755043430.779:1426): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc91edb20 a2=0 a3=1 items=0 ppid=3010 pid=5767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 141.592126] audit: type=1327 audit(1755043430.779:1426): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 142.947524] audit: type=1400 audit(1755043432.157:1427): avc: denied { watch } for pid=5743 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_00_03_19.1135236923/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c550,c952 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c550,c952 tclass=file permissive=0 [ 145.528736] kauditd_printk_skb: 71 callbacks suppressed [ 145.528740] audit: type=1130 audit(1755043434.738:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.16.74:22-139.178.89.65:41918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 145.774544] audit: type=1101 audit(1755043434.984:1451): pid=5843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 145.792570] audit: type=1103 audit(1755043434.997:1452): pid=5843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 145.806774] audit: type=1006 audit(1755043434.997:1453): pid=5843 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 [ 145.820685] audit: type=1300 audit(1755043434.997:1453): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeff38480 a2=3 a3=1 items=0 ppid=1 pid=5843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 145.834410] audit: type=1327 audit(1755043434.997:1453): proctitle=737368643A20636F7265205B707269765D [ 145.845895] audit: type=1105 audit(1755043435.055:1454): pid=5843 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 145.862163] audit: type=1103 audit(1755043435.069:1455): pid=5850 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 146.272864] audit: type=1400 audit(1755043435.481:1456): avc: denied { perfmon } for pid=5868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 146.284003] audit: type=1300 audit(1755043435.481:1456): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001cd5a0 a2=3c a3=0 items=0 ppid=4447 pid=5868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 152.688674] kauditd_printk_skb: 138 callbacks suppressed [ 152.688679] audit: type=1130 audit(1755043441.898:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.16.74:22-139.178.89.65:46966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 152.894030] audit: type=1101 audit(1755043442.103:1507): pid=5995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.904895] audit: type=1103 audit(1755043442.106:1508): pid=5995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.916238] audit: type=1006 audit(1755043442.107:1509): pid=5995 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 [ 152.923019] audit: type=1300 audit(1755043442.107:1509): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe2a80160 a2=3 a3=1 items=0 ppid=1 pid=5995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 152.934252] audit: type=1327 audit(1755043442.107:1509): proctitle=737368643A20636F7265205B707269765D [ 152.953168] audit: type=1105 audit(1755043442.163:1510): pid=5995 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.966926] audit: type=1103 audit(1755043442.176:1511): pid=5997 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 153.234268] audit: type=1106 audit(1755043442.444:1512): pid=5995 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 153.246476] audit: type=1104 audit(1755043442.444:1513): pid=5995 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 158.262545] kauditd_printk_skb: 1 callbacks suppressed [ 158.262550] audit: type=1130 audit(1755043447.472:1515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.16.74:22-139.178.89.65:46978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 158.463676] audit: type=1101 audit(1755043447.673:1516): pid=6032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 158.474609] audit: type=1103 audit(1755043447.674:1517): pid=6032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 158.485070] audit: type=1006 audit(1755043447.674:1518): pid=6032 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 [ 158.491552] audit: type=1300 audit(1755043447.674:1518): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd819f390 a2=3 a3=1 items=0 ppid=1 pid=6032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 158.502621] audit: type=1327 audit(1755043447.674:1518): proctitle=737368643A20636F7265205B707269765D [ 158.519169] audit: type=1105 audit(1755043447.729:1519): pid=6032 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 158.531706] audit: type=1103 audit(1755043447.741:1520): pid=6034 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 158.833537] audit: type=1106 audit(1755043448.041:1521): pid=6032 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 158.849950] audit: type=1104 audit(1755043448.041:1522): pid=6032 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 163.859969] kauditd_printk_skb: 1 callbacks suppressed [ 163.859974] audit: type=1130 audit(1755043453.069:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.16.74:22-139.178.89.65:32950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 164.063586] audit: type=1101 audit(1755043453.273:1525): pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.076880] audit: type=1103 audit(1755043453.286:1526): pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.089975] audit: type=1006 audit(1755043453.286:1527): pid=6083 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 [ 164.096989] audit: type=1300 audit(1755043453.286:1527): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcacfea50 a2=3 a3=1 items=0 ppid=1 pid=6083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 164.107820] audit: type=1327 audit(1755043453.286:1527): proctitle=737368643A20636F7265205B707269765D [ 164.124551] audit: type=1105 audit(1755043453.334:1528): pid=6083 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.136913] audit: type=1103 audit(1755043453.340:1529): pid=6085 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.409740] audit: type=1106 audit(1755043453.619:1530): pid=6083 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.422985] audit: type=1104 audit(1755043453.621:1531): pid=6083 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 169.439280] kauditd_printk_skb: 1 callbacks suppressed [ 169.439285] audit: type=1130 audit(1755043458.649:1533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.16.74:22-139.178.89.65:32962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 169.625786] audit: type=1101 audit(1755043458.835:1534): pid=6105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 169.653348] audit: type=1103 audit(1755043458.838:1535): pid=6105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 169.675467] audit: type=1006 audit(1755043458.838:1536): pid=6105 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 [ 169.689258] audit: type=1300 audit(1755043458.838:1536): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7c0bc30 a2=3 a3=1 items=0 ppid=1 pid=6105 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 169.701169] audit: type=1327 audit(1755043458.838:1536): proctitle=737368643A20636F7265205B707269765D [ 169.704788] audit: type=1105 audit(1755043458.885:1537): pid=6105 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 169.718366] audit: type=1103 audit(1755043458.893:1538): pid=6107 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 169.947683] audit: type=1106 audit(1755043459.157:1539): pid=6105 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 169.959869] audit: type=1104 audit(1755043459.157:1540): pid=6105 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 174.981026] kauditd_printk_skb: 1 callbacks suppressed [ 174.981031] audit: type=1130 audit(1755043464.190:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.16.74:22-139.178.89.65:59676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 175.168850] audit: type=1101 audit(1755043464.378:1543): pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.180068] audit: type=1103 audit(1755043464.378:1544): pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.190807] audit: type=1006 audit(1755043464.378:1545): pid=6119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 [ 175.202255] audit: type=1300 audit(1755043464.378:1545): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe76e5950 a2=3 a3=1 items=0 ppid=1 pid=6119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 175.217302] audit: type=1327 audit(1755043464.378:1545): proctitle=737368643A20636F7265205B707269765D [ 175.234972] audit: type=1105 audit(1755043464.444:1546): pid=6119 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.247752] audit: type=1103 audit(1755043464.444:1547): pid=6121 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.492559] audit: type=1106 audit(1755043464.702:1548): pid=6119 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 175.505542] audit: type=1104 audit(1755043464.702:1549): pid=6119 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 184.352058] kauditd_printk_skb: 63 callbacks suppressed [ 184.352063] audit: type=1130 audit(1755043473.561:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.16.74:22-139.178.89.65:52454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 184.533866] audit: type=1101 audit(1755043473.743:1594): pid=6198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 184.548599] audit: type=1103 audit(1755043473.758:1595): pid=6198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 184.560907] audit: type=1006 audit(1755043473.768:1596): pid=6198 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 [ 184.567654] audit: type=1300 audit(1755043473.768:1596): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc21749a0 a2=3 a3=1 items=0 ppid=1 pid=6198 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 184.579779] audit: type=1327 audit(1755043473.768:1596): proctitle=737368643A20636F7265205B707269765D [ 184.607081] audit: type=1105 audit(1755043473.816:1597): pid=6198 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 184.619243] audit: type=1103 audit(1755043473.819:1598): pid=6200 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 184.920338] audit: type=1106 audit(1755043474.130:1599): pid=6198 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 184.934796] audit: type=1104 audit(1755043474.130:1600): pid=6198 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 189.949389] kauditd_printk_skb: 7 callbacks suppressed [ 189.949393] audit: type=1130 audit(1755043479.159:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.16.74:22-139.178.89.65:54018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 190.017283] audit: type=1400 audit(1755043479.227:1605): avc: denied { watch } for pid=2771 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c433 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 190.027748] audit: type=1400 audit(1755043479.232:1606): avc: denied { watch } for pid=2771 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c433 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 190.045506] audit: type=1300 audit(1755043479.232:1606): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400084b180 a2=fc6 a3=0 items=0 ppid=2524 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c433 key=(null) [ 190.065206] audit: type=1327 audit(1755043479.232:1606): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 190.078081] audit: type=1300 audit(1755043479.227:1605): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ae3350 a2=fc6 a3=0 items=0 ppid=2524 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c433 key=(null) [ 190.095262] audit: type=1327 audit(1755043479.227:1605): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 190.118354] audit: type=1400 audit(1755043479.311:1607): avc: denied { watch } for pid=2751 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c889 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 190.136269] audit: type=1300 audit(1755043479.311:1607): arch=c00000b7 syscall=27 success=no exit=-13 a0=80 a1=40068b53b0 a2=fc6 a3=0 items=0 ppid=2528 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c579,c889 key=(null) [ 190.154274] audit: type=1327 audit(1755043479.311:1607): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 [ 195.591122] kauditd_printk_skb: 25 callbacks suppressed [ 195.591127] audit: type=1130 audit(1755043484.800:1621): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.16.74:22-139.178.89.65:54034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 195.782946] audit: type=1101 audit(1755043484.992:1622): pid=6285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 195.807473] audit: type=1103 audit(1755043484.995:1623): pid=6285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 195.818511] audit: type=1006 audit(1755043484.995:1624): pid=6285 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 [ 195.825659] audit: type=1300 audit(1755043484.995:1624): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe97fdf90 a2=3 a3=1 items=0 ppid=1 pid=6285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 195.837625] audit: type=1327 audit(1755043484.995:1624): proctitle=737368643A20636F7265205B707269765D [ 195.849810] audit: type=1105 audit(1755043485.059:1625): pid=6285 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 195.865195] audit: type=1103 audit(1755043485.074:1626): pid=6287 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 196.155735] audit: type=1106 audit(1755043485.365:1627): pid=6285 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 196.171167] audit: type=1104 audit(1755043485.365:1628): pid=6285 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 201.182670] kauditd_printk_skb: 13 callbacks suppressed [ 201.182675] audit: type=1130 audit(1755043490.392:1634): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.16.74:22-139.178.89.65:51690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 201.366168] audit: type=1101 audit(1755043490.576:1635): pid=6300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 201.381193] audit: type=1103 audit(1755043490.584:1636): pid=6300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 201.392335] audit: type=1006 audit(1755043490.584:1637): pid=6300 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 [ 201.398683] audit: type=1300 audit(1755043490.584:1637): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6964890 a2=3 a3=1 items=0 ppid=1 pid=6300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 201.412023] audit: type=1327 audit(1755043490.584:1637): proctitle=737368643A20636F7265205B707269765D [ 201.419015] audit: type=1105 audit(1755043490.624:1638): pid=6300 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 201.431247] audit: type=1103 audit(1755043490.627:1639): pid=6302 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 201.706925] audit: type=1106 audit(1755043490.916:1640): pid=6300 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 201.722895] audit: type=1104 audit(1755043490.916:1641): pid=6300 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 206.740072] kauditd_printk_skb: 4 callbacks suppressed [ 206.740077] audit: type=1130 audit(1755043495.949:1644): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.16.74:22-139.178.89.65:51704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 206.932544] audit: type=1101 audit(1755043496.140:1645): pid=6330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 206.948336] audit: type=1103 audit(1755043496.153:1646): pid=6330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 206.972085] audit: type=1006 audit(1755043496.153:1647): pid=6330 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 [ 206.979223] audit: type=1300 audit(1755043496.153:1647): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4744190 a2=3 a3=1 items=0 ppid=1 pid=6330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 206.990442] audit: type=1327 audit(1755043496.153:1647): proctitle=737368643A20636F7265205B707269765D [ 207.004154] audit: type=1105 audit(1755043496.213:1648): pid=6330 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 207.017790] audit: type=1103 audit(1755043496.226:1649): pid=6334 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 207.318900] audit: type=1106 audit(1755043496.528:1650): pid=6330 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 207.332611] audit: type=1104 audit(1755043496.529:1651): pid=6330 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 212.349307] kauditd_printk_skb: 4 callbacks suppressed [ 212.349313] audit: type=1130 audit(1755043501.558:1654): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.16.74:22-139.178.89.65:34594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 212.534356] audit: type=1101 audit(1755043501.744:1655): pid=6351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 212.547796] audit: type=1103 audit(1755043501.756:1656): pid=6351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 212.560531] audit: type=1006 audit(1755043501.757:1657): pid=6351 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 [ 212.567754] audit: type=1300 audit(1755043501.757:1657): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3d90cf0 a2=3 a3=1 items=0 ppid=1 pid=6351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 212.580167] audit: type=1327 audit(1755043501.757:1657): proctitle=737368643A20636F7265205B707269765D [ 212.598812] audit: type=1105 audit(1755043501.808:1658): pid=6351 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 212.613837] audit: type=1103 audit(1755043501.822:1659): pid=6353 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 212.896106] audit: type=1106 audit(1755043502.106:1660): pid=6351 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 212.908533] audit: type=1104 audit(1755043502.106:1661): pid=6351 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'