Jun 25 18:06:10.726179 kernel: microcode: microcode updated early to revision 0xfa, date = 2023-02-27 Jun 25 18:06:10.726191 kernel: Linux version 6.1.95-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.2.1_p20230826 p7) 13.2.1 20230826, GNU ld (Gentoo 2.40 p5) 2.40.0) #1 SMP PREEMPT_DYNAMIC Tue Jun 25 13:16:37 -00 2024 Jun 25 18:06:10.726197 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=05dd62847a393595c8cf7409b58afa2d4045a2186c3cd58722296be6f3bc4fa9 Jun 25 18:06:10.726202 kernel: BIOS-provided physical RAM map: Jun 25 18:06:10.726205 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Jun 25 18:06:10.726209 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Jun 25 18:06:10.726214 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Jun 25 18:06:10.726217 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Jun 25 18:06:10.726221 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Jun 25 18:06:10.726225 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081f83fff] usable Jun 25 18:06:10.726229 kernel: BIOS-e820: [mem 0x0000000081f84000-0x0000000081f84fff] ACPI NVS Jun 25 18:06:10.726233 kernel: BIOS-e820: [mem 0x0000000081f85000-0x0000000081f85fff] reserved Jun 25 18:06:10.726237 kernel: BIOS-e820: [mem 0x0000000081f86000-0x000000008afccfff] usable Jun 25 18:06:10.726241 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Jun 25 18:06:10.726246 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Jun 25 18:06:10.726250 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Jun 25 18:06:10.726255 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Jun 25 18:06:10.726259 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Jun 25 18:06:10.726263 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Jun 25 18:06:10.726267 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Jun 25 18:06:10.726271 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Jun 25 18:06:10.726275 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Jun 25 18:06:10.726279 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Jun 25 18:06:10.726283 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Jun 25 18:06:10.726287 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Jun 25 18:06:10.726291 kernel: NX (Execute Disable) protection: active Jun 25 18:06:10.726295 kernel: SMBIOS 3.2.1 present. Jun 25 18:06:10.726300 kernel: DMI: Supermicro SYS-5019C-MR/X11SCM-F, BIOS 1.9 09/16/2022 Jun 25 18:06:10.726304 kernel: tsc: Detected 3400.000 MHz processor Jun 25 18:06:10.726308 kernel: tsc: Detected 3399.906 MHz TSC Jun 25 18:06:10.726313 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jun 25 18:06:10.726317 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jun 25 18:06:10.726322 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Jun 25 18:06:10.726326 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jun 25 18:06:10.726331 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Jun 25 18:06:10.726335 kernel: Using GB pages for direct mapping Jun 25 18:06:10.726339 kernel: ACPI: Early table checksum verification disabled Jun 25 18:06:10.726344 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Jun 25 18:06:10.726349 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Jun 25 18:06:10.726353 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Jun 25 18:06:10.726359 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Jun 25 18:06:10.726364 kernel: ACPI: FACS 0x000000008C66CF80 000040 Jun 25 18:06:10.726368 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Jun 25 18:06:10.726373 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Jun 25 18:06:10.726379 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Jun 25 18:06:10.726384 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Jun 25 18:06:10.726388 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Jun 25 18:06:10.726393 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Jun 25 18:06:10.726398 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Jun 25 18:06:10.726402 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Jun 25 18:06:10.726407 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:10.726413 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Jun 25 18:06:10.726417 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Jun 25 18:06:10.726424 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:10.726429 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:10.726434 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Jun 25 18:06:10.726438 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Jun 25 18:06:10.726443 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:10.726448 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:10.726452 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Jun 25 18:06:10.726458 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Jun 25 18:06:10.726463 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Jun 25 18:06:10.726468 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Jun 25 18:06:10.726472 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Jun 25 18:06:10.726477 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Jun 25 18:06:10.726481 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Jun 25 18:06:10.726486 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Jun 25 18:06:10.726491 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Jun 25 18:06:10.726496 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Jun 25 18:06:10.726501 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Jun 25 18:06:10.726506 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Jun 25 18:06:10.726510 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Jun 25 18:06:10.726515 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Jun 25 18:06:10.726520 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Jun 25 18:06:10.726524 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Jun 25 18:06:10.726529 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Jun 25 18:06:10.726534 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Jun 25 18:06:10.726539 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Jun 25 18:06:10.726544 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Jun 25 18:06:10.726548 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Jun 25 18:06:10.726553 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Jun 25 18:06:10.726557 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Jun 25 18:06:10.726562 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Jun 25 18:06:10.726567 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Jun 25 18:06:10.726571 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Jun 25 18:06:10.726576 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Jun 25 18:06:10.726581 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Jun 25 18:06:10.726586 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Jun 25 18:06:10.726590 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Jun 25 18:06:10.726595 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Jun 25 18:06:10.726600 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Jun 25 18:06:10.726604 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Jun 25 18:06:10.726609 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Jun 25 18:06:10.726614 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Jun 25 18:06:10.726618 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Jun 25 18:06:10.726623 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Jun 25 18:06:10.726628 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Jun 25 18:06:10.726633 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Jun 25 18:06:10.726638 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Jun 25 18:06:10.726642 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Jun 25 18:06:10.726647 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Jun 25 18:06:10.726652 kernel: No NUMA configuration found Jun 25 18:06:10.726656 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Jun 25 18:06:10.726661 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Jun 25 18:06:10.726666 kernel: Zone ranges: Jun 25 18:06:10.726671 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jun 25 18:06:10.726676 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jun 25 18:06:10.726681 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Jun 25 18:06:10.726685 kernel: Movable zone start for each node Jun 25 18:06:10.726690 kernel: Early memory node ranges Jun 25 18:06:10.726695 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Jun 25 18:06:10.726699 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Jun 25 18:06:10.726704 kernel: node 0: [mem 0x0000000040400000-0x0000000081f83fff] Jun 25 18:06:10.726708 kernel: node 0: [mem 0x0000000081f86000-0x000000008afccfff] Jun 25 18:06:10.726714 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Jun 25 18:06:10.726718 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Jun 25 18:06:10.726723 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Jun 25 18:06:10.726728 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Jun 25 18:06:10.726735 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jun 25 18:06:10.726741 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Jun 25 18:06:10.726746 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Jun 25 18:06:10.726751 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Jun 25 18:06:10.726757 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Jun 25 18:06:10.726762 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Jun 25 18:06:10.726767 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Jun 25 18:06:10.726772 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Jun 25 18:06:10.726777 kernel: ACPI: PM-Timer IO Port: 0x1808 Jun 25 18:06:10.726782 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Jun 25 18:06:10.726787 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Jun 25 18:06:10.726792 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Jun 25 18:06:10.726797 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Jun 25 18:06:10.726802 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Jun 25 18:06:10.726807 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Jun 25 18:06:10.726812 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Jun 25 18:06:10.726817 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Jun 25 18:06:10.726822 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Jun 25 18:06:10.726827 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Jun 25 18:06:10.726832 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Jun 25 18:06:10.726837 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Jun 25 18:06:10.726842 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Jun 25 18:06:10.726847 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Jun 25 18:06:10.726852 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Jun 25 18:06:10.726857 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Jun 25 18:06:10.726862 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Jun 25 18:06:10.726867 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jun 25 18:06:10.726872 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jun 25 18:06:10.726877 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jun 25 18:06:10.726882 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jun 25 18:06:10.726887 kernel: TSC deadline timer available Jun 25 18:06:10.726893 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Jun 25 18:06:10.726898 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Jun 25 18:06:10.726903 kernel: Booting paravirtualized kernel on bare hardware Jun 25 18:06:10.726908 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jun 25 18:06:10.726914 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1 Jun 25 18:06:10.726919 kernel: percpu: Embedded 57 pages/cpu s194792 r8192 d30488 u262144 Jun 25 18:06:10.726923 kernel: pcpu-alloc: s194792 r8192 d30488 u262144 alloc=1*2097152 Jun 25 18:06:10.726928 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Jun 25 18:06:10.726933 kernel: Fallback order for Node 0: 0 Jun 25 18:06:10.726939 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Jun 25 18:06:10.726944 kernel: Policy zone: Normal Jun 25 18:06:10.726949 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=05dd62847a393595c8cf7409b58afa2d4045a2186c3cd58722296be6f3bc4fa9 Jun 25 18:06:10.726954 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jun 25 18:06:10.726959 kernel: random: crng init done Jun 25 18:06:10.726964 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Jun 25 18:06:10.726969 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Jun 25 18:06:10.726974 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jun 25 18:06:10.726979 kernel: software IO TLB: area num 16. Jun 25 18:06:10.726985 kernel: Memory: 32716396K/33452980K available (12293K kernel code, 2301K rwdata, 19992K rodata, 47156K init, 4308K bss, 736324K reserved, 0K cma-reserved) Jun 25 18:06:10.726990 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Jun 25 18:06:10.726995 kernel: ftrace: allocating 36080 entries in 141 pages Jun 25 18:06:10.727000 kernel: ftrace: allocated 141 pages with 4 groups Jun 25 18:06:10.727006 kernel: Dynamic Preempt: voluntary Jun 25 18:06:10.727010 kernel: rcu: Preemptible hierarchical RCU implementation. Jun 25 18:06:10.727016 kernel: rcu: RCU event tracing is enabled. Jun 25 18:06:10.727021 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Jun 25 18:06:10.727026 kernel: Trampoline variant of Tasks RCU enabled. Jun 25 18:06:10.727032 kernel: Rude variant of Tasks RCU enabled. Jun 25 18:06:10.727037 kernel: Tracing variant of Tasks RCU enabled. Jun 25 18:06:10.727042 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jun 25 18:06:10.727047 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Jun 25 18:06:10.727052 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Jun 25 18:06:10.727057 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jun 25 18:06:10.727062 kernel: Console: colour dummy device 80x25 Jun 25 18:06:10.727067 kernel: printk: console [tty0] enabled Jun 25 18:06:10.727072 kernel: printk: console [ttyS1] enabled Jun 25 18:06:10.727078 kernel: ACPI: Core revision 20220331 Jun 25 18:06:10.727083 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Jun 25 18:06:10.727088 kernel: APIC: Switch to symmetric I/O mode setup Jun 25 18:06:10.727093 kernel: DMAR: Host address width 39 Jun 25 18:06:10.727098 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Jun 25 18:06:10.727103 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Jun 25 18:06:10.727108 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Jun 25 18:06:10.727113 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Jun 25 18:06:10.727118 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Jun 25 18:06:10.727124 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Jun 25 18:06:10.727129 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Jun 25 18:06:10.727134 kernel: x2apic enabled Jun 25 18:06:10.727139 kernel: Switched APIC routing to cluster x2apic. Jun 25 18:06:10.727144 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Jun 25 18:06:10.727149 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Jun 25 18:06:10.727154 kernel: CPU0: Thermal monitoring enabled (TM1) Jun 25 18:06:10.727159 kernel: process: using mwait in idle threads Jun 25 18:06:10.727164 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jun 25 18:06:10.727170 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jun 25 18:06:10.727174 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jun 25 18:06:10.727179 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jun 25 18:06:10.727184 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jun 25 18:06:10.727189 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Jun 25 18:06:10.727194 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jun 25 18:06:10.727199 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Jun 25 18:06:10.727204 kernel: RETBleed: Mitigation: Enhanced IBRS Jun 25 18:06:10.727209 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jun 25 18:06:10.727214 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Jun 25 18:06:10.727219 kernel: TAA: Mitigation: TSX disabled Jun 25 18:06:10.727224 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Jun 25 18:06:10.727229 kernel: SRBDS: Mitigation: Microcode Jun 25 18:06:10.727234 kernel: GDS: Mitigation: Microcode Jun 25 18:06:10.727239 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jun 25 18:06:10.727244 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jun 25 18:06:10.727249 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jun 25 18:06:10.727254 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Jun 25 18:06:10.727259 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Jun 25 18:06:10.727264 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jun 25 18:06:10.727269 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Jun 25 18:06:10.727273 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Jun 25 18:06:10.727279 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Jun 25 18:06:10.727284 kernel: Freeing SMP alternatives memory: 32K Jun 25 18:06:10.727289 kernel: pid_max: default: 32768 minimum: 301 Jun 25 18:06:10.727294 kernel: LSM: Security Framework initializing Jun 25 18:06:10.727299 kernel: SELinux: Initializing. Jun 25 18:06:10.727304 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jun 25 18:06:10.727309 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jun 25 18:06:10.727313 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Jun 25 18:06:10.727318 kernel: cblist_init_generic: Setting adjustable number of callback queues. Jun 25 18:06:10.727323 kernel: cblist_init_generic: Setting shift to 4 and lim to 1. Jun 25 18:06:10.727328 kernel: cblist_init_generic: Setting adjustable number of callback queues. Jun 25 18:06:10.727334 kernel: cblist_init_generic: Setting shift to 4 and lim to 1. Jun 25 18:06:10.727339 kernel: cblist_init_generic: Setting adjustable number of callback queues. Jun 25 18:06:10.727344 kernel: cblist_init_generic: Setting shift to 4 and lim to 1. Jun 25 18:06:10.727349 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Jun 25 18:06:10.727354 kernel: ... version: 4 Jun 25 18:06:10.727359 kernel: ... bit width: 48 Jun 25 18:06:10.727364 kernel: ... generic registers: 4 Jun 25 18:06:10.727369 kernel: ... value mask: 0000ffffffffffff Jun 25 18:06:10.727374 kernel: ... max period: 00007fffffffffff Jun 25 18:06:10.727379 kernel: ... fixed-purpose events: 3 Jun 25 18:06:10.727384 kernel: ... event mask: 000000070000000f Jun 25 18:06:10.727389 kernel: signal: max sigframe size: 2032 Jun 25 18:06:10.727394 kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Jun 25 18:06:10.727399 kernel: rcu: Hierarchical SRCU implementation. Jun 25 18:06:10.727404 kernel: rcu: Max phase no-delay instances is 400. Jun 25 18:06:10.727409 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Jun 25 18:06:10.727414 kernel: smp: Bringing up secondary CPUs ... Jun 25 18:06:10.727421 kernel: x86: Booting SMP configuration: Jun 25 18:06:10.727426 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Jun 25 18:06:10.727433 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jun 25 18:06:10.727438 kernel: #9 #10 #11 #12 #13 #14 #15 Jun 25 18:06:10.727443 kernel: smp: Brought up 1 node, 16 CPUs Jun 25 18:06:10.727448 kernel: smpboot: Max logical packages: 1 Jun 25 18:06:10.727453 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Jun 25 18:06:10.727457 kernel: devtmpfs: initialized Jun 25 18:06:10.727463 kernel: x86/mm: Memory block size: 128MB Jun 25 18:06:10.727468 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81f84000-0x81f84fff] (4096 bytes) Jun 25 18:06:10.727473 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Jun 25 18:06:10.727479 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jun 25 18:06:10.727484 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Jun 25 18:06:10.727489 kernel: pinctrl core: initialized pinctrl subsystem Jun 25 18:06:10.727494 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jun 25 18:06:10.727499 kernel: audit: initializing netlink subsys (disabled) Jun 25 18:06:10.727504 kernel: audit: type=2000 audit(1719338765.058:1): state=initialized audit_enabled=0 res=1 Jun 25 18:06:10.727508 kernel: thermal_sys: Registered thermal governor 'step_wise' Jun 25 18:06:10.727513 kernel: thermal_sys: Registered thermal governor 'user_space' Jun 25 18:06:10.727518 kernel: cpuidle: using governor menu Jun 25 18:06:10.727524 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jun 25 18:06:10.727529 kernel: dca service started, version 1.12.1 Jun 25 18:06:10.727534 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Jun 25 18:06:10.727539 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Jun 25 18:06:10.727544 kernel: PCI: Using configuration type 1 for base access Jun 25 18:06:10.727549 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Jun 25 18:06:10.727554 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jun 25 18:06:10.727559 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Jun 25 18:06:10.727565 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Jun 25 18:06:10.727570 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Jun 25 18:06:10.727575 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Jun 25 18:06:10.727580 kernel: ACPI: Added _OSI(Module Device) Jun 25 18:06:10.727585 kernel: ACPI: Added _OSI(Processor Device) Jun 25 18:06:10.727590 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jun 25 18:06:10.727595 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jun 25 18:06:10.727600 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Jun 25 18:06:10.727605 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:10.727610 kernel: ACPI: SSDT 0xFFFF9762C1F90400 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Jun 25 18:06:10.727616 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Jun 25 18:06:10.727621 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:10.727626 kernel: ACPI: SSDT 0xFFFF9762C1B46C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Jun 25 18:06:10.727630 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:10.727635 kernel: ACPI: SSDT 0xFFFF9762C1AF9800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Jun 25 18:06:10.727640 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:10.727645 kernel: ACPI: SSDT 0xFFFF9762C1F67000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Jun 25 18:06:10.727650 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:10.727655 kernel: ACPI: SSDT 0xFFFF9762C0159000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Jun 25 18:06:10.727661 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:10.727666 kernel: ACPI: SSDT 0xFFFF9762C1B45000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Jun 25 18:06:10.727671 kernel: ACPI: Interpreter enabled Jun 25 18:06:10.727676 kernel: ACPI: PM: (supports S0 S5) Jun 25 18:06:10.727681 kernel: ACPI: Using IOAPIC for interrupt routing Jun 25 18:06:10.727686 kernel: HEST: Enabling Firmware First mode for corrected errors. Jun 25 18:06:10.727691 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Jun 25 18:06:10.727696 kernel: HEST: Table parsing has been initialized. Jun 25 18:06:10.727701 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Jun 25 18:06:10.727706 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jun 25 18:06:10.727711 kernel: PCI: Using E820 reservations for host bridge windows Jun 25 18:06:10.727716 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Jun 25 18:06:10.727721 kernel: ACPI: PM: Power Resource [USBC] Jun 25 18:06:10.727726 kernel: ACPI: PM: Power Resource [V0PR] Jun 25 18:06:10.727731 kernel: ACPI: PM: Power Resource [V1PR] Jun 25 18:06:10.727736 kernel: ACPI: PM: Power Resource [V2PR] Jun 25 18:06:10.727741 kernel: ACPI: PM: Power Resource [WRST] Jun 25 18:06:10.727746 kernel: ACPI: PM: Power Resource [FN00] Jun 25 18:06:10.727751 kernel: ACPI: PM: Power Resource [FN01] Jun 25 18:06:10.727756 kernel: ACPI: PM: Power Resource [FN02] Jun 25 18:06:10.727761 kernel: ACPI: PM: Power Resource [FN03] Jun 25 18:06:10.727766 kernel: ACPI: PM: Power Resource [FN04] Jun 25 18:06:10.727771 kernel: ACPI: PM: Power Resource [PIN] Jun 25 18:06:10.727776 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Jun 25 18:06:10.727850 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jun 25 18:06:10.727898 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Jun 25 18:06:10.727951 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Jun 25 18:06:10.727959 kernel: PCI host bridge to bus 0000:00 Jun 25 18:06:10.728004 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jun 25 18:06:10.728044 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jun 25 18:06:10.728082 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jun 25 18:06:10.728119 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Jun 25 18:06:10.728157 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Jun 25 18:06:10.728196 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Jun 25 18:06:10.728250 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Jun 25 18:06:10.728302 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Jun 25 18:06:10.728348 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:10.728395 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Jun 25 18:06:10.728444 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Jun 25 18:06:10.728494 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Jun 25 18:06:10.728539 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Jun 25 18:06:10.728590 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Jun 25 18:06:10.728635 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Jun 25 18:06:10.728677 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Jun 25 18:06:10.728724 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Jun 25 18:06:10.728770 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Jun 25 18:06:10.728813 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Jun 25 18:06:10.728862 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Jun 25 18:06:10.728905 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jun 25 18:06:10.728955 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Jun 25 18:06:10.728998 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jun 25 18:06:10.729048 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Jun 25 18:06:10.729097 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Jun 25 18:06:10.729142 kernel: pci 0000:00:16.0: PME# supported from D3hot Jun 25 18:06:10.729189 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Jun 25 18:06:10.729232 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Jun 25 18:06:10.729275 kernel: pci 0000:00:16.1: PME# supported from D3hot Jun 25 18:06:10.729321 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Jun 25 18:06:10.729369 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Jun 25 18:06:10.729411 kernel: pci 0000:00:16.4: PME# supported from D3hot Jun 25 18:06:10.729460 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Jun 25 18:06:10.729504 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Jun 25 18:06:10.729547 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Jun 25 18:06:10.729590 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Jun 25 18:06:10.729632 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Jun 25 18:06:10.729678 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Jun 25 18:06:10.729722 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Jun 25 18:06:10.729766 kernel: pci 0000:00:17.0: PME# supported from D3hot Jun 25 18:06:10.729814 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Jun 25 18:06:10.729857 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:10.729910 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Jun 25 18:06:10.729956 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Jun 25 18:06:10.730004 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Jun 25 18:06:10.730048 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Jun 25 18:06:10.730096 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Jun 25 18:06:10.730142 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:10.730189 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Jun 25 18:06:10.730234 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Jun 25 18:06:10.730282 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Jun 25 18:06:10.730326 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jun 25 18:06:10.730374 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Jun 25 18:06:10.730427 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Jun 25 18:06:10.730471 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Jun 25 18:06:10.730515 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Jun 25 18:06:10.730564 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Jun 25 18:06:10.730607 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Jun 25 18:06:10.730657 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Jun 25 18:06:10.730702 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Jun 25 18:06:10.730750 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Jun 25 18:06:10.730794 kernel: pci 0000:01:00.0: PME# supported from D3cold Jun 25 18:06:10.730839 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jun 25 18:06:10.730883 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jun 25 18:06:10.730934 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Jun 25 18:06:10.730978 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Jun 25 18:06:10.731026 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Jun 25 18:06:10.731070 kernel: pci 0000:01:00.1: PME# supported from D3cold Jun 25 18:06:10.731115 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jun 25 18:06:10.731161 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jun 25 18:06:10.731205 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jun 25 18:06:10.731250 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Jun 25 18:06:10.731293 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jun 25 18:06:10.731337 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Jun 25 18:06:10.731387 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Jun 25 18:06:10.731437 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Jun 25 18:06:10.731482 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Jun 25 18:06:10.731527 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Jun 25 18:06:10.731572 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Jun 25 18:06:10.731616 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:10.731660 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Jun 25 18:06:10.731706 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jun 25 18:06:10.731750 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Jun 25 18:06:10.731799 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Jun 25 18:06:10.731844 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Jun 25 18:06:10.731889 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Jun 25 18:06:10.731935 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Jun 25 18:06:10.731979 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Jun 25 18:06:10.732023 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:10.732069 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Jun 25 18:06:10.732113 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jun 25 18:06:10.732155 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Jun 25 18:06:10.732198 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Jun 25 18:06:10.732248 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Jun 25 18:06:10.732293 kernel: pci 0000:06:00.0: enabling Extended Tags Jun 25 18:06:10.732338 kernel: pci 0000:06:00.0: supports D1 D2 Jun 25 18:06:10.732384 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jun 25 18:06:10.732432 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Jun 25 18:06:10.732476 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Jun 25 18:06:10.732521 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Jun 25 18:06:10.732571 kernel: pci_bus 0000:07: extended config space not accessible Jun 25 18:06:10.732625 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Jun 25 18:06:10.732672 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Jun 25 18:06:10.732722 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Jun 25 18:06:10.732769 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Jun 25 18:06:10.732816 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jun 25 18:06:10.732862 kernel: pci 0000:07:00.0: supports D1 D2 Jun 25 18:06:10.732910 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jun 25 18:06:10.732954 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Jun 25 18:06:10.733000 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Jun 25 18:06:10.733044 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Jun 25 18:06:10.733053 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Jun 25 18:06:10.733059 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Jun 25 18:06:10.733064 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Jun 25 18:06:10.733070 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Jun 25 18:06:10.733075 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Jun 25 18:06:10.733080 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Jun 25 18:06:10.733086 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Jun 25 18:06:10.733091 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Jun 25 18:06:10.733096 kernel: iommu: Default domain type: Translated Jun 25 18:06:10.733102 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jun 25 18:06:10.733108 kernel: pps_core: LinuxPPS API ver. 1 registered Jun 25 18:06:10.733113 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jun 25 18:06:10.733119 kernel: PTP clock support registered Jun 25 18:06:10.733124 kernel: PCI: Using ACPI for IRQ routing Jun 25 18:06:10.733129 kernel: PCI: pci_cache_line_size set to 64 bytes Jun 25 18:06:10.733135 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Jun 25 18:06:10.733140 kernel: e820: reserve RAM buffer [mem 0x81f84000-0x83ffffff] Jun 25 18:06:10.733146 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Jun 25 18:06:10.733152 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Jun 25 18:06:10.733157 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Jun 25 18:06:10.733162 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Jun 25 18:06:10.733209 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Jun 25 18:06:10.733257 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Jun 25 18:06:10.733305 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jun 25 18:06:10.733312 kernel: vgaarb: loaded Jun 25 18:06:10.733318 kernel: clocksource: Switched to clocksource tsc-early Jun 25 18:06:10.733324 kernel: VFS: Disk quotas dquot_6.6.0 Jun 25 18:06:10.733330 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jun 25 18:06:10.733335 kernel: pnp: PnP ACPI init Jun 25 18:06:10.733381 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Jun 25 18:06:10.733426 kernel: pnp 00:02: [dma 0 disabled] Jun 25 18:06:10.733471 kernel: pnp 00:03: [dma 0 disabled] Jun 25 18:06:10.733516 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Jun 25 18:06:10.733558 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Jun 25 18:06:10.733600 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Jun 25 18:06:10.733644 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Jun 25 18:06:10.733683 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Jun 25 18:06:10.733721 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Jun 25 18:06:10.733760 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Jun 25 18:06:10.733799 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Jun 25 18:06:10.733840 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Jun 25 18:06:10.733878 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Jun 25 18:06:10.733917 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Jun 25 18:06:10.733959 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Jun 25 18:06:10.733999 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Jun 25 18:06:10.734037 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Jun 25 18:06:10.734077 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Jun 25 18:06:10.734116 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Jun 25 18:06:10.734154 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Jun 25 18:06:10.734193 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Jun 25 18:06:10.734234 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Jun 25 18:06:10.734242 kernel: pnp: PnP ACPI: found 10 devices Jun 25 18:06:10.734248 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jun 25 18:06:10.734253 kernel: NET: Registered PF_INET protocol family Jun 25 18:06:10.734260 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jun 25 18:06:10.734265 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Jun 25 18:06:10.734271 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jun 25 18:06:10.734276 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jun 25 18:06:10.734282 kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Jun 25 18:06:10.734287 kernel: TCP: Hash tables configured (established 262144 bind 65536) Jun 25 18:06:10.734292 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Jun 25 18:06:10.734298 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Jun 25 18:06:10.734303 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jun 25 18:06:10.734309 kernel: NET: Registered PF_XDP protocol family Jun 25 18:06:10.734353 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Jun 25 18:06:10.734396 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Jun 25 18:06:10.734442 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Jun 25 18:06:10.734490 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Jun 25 18:06:10.734534 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jun 25 18:06:10.734580 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Jun 25 18:06:10.734625 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jun 25 18:06:10.734672 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jun 25 18:06:10.734715 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Jun 25 18:06:10.734760 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jun 25 18:06:10.734803 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Jun 25 18:06:10.734849 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Jun 25 18:06:10.734892 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jun 25 18:06:10.734935 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Jun 25 18:06:10.734980 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Jun 25 18:06:10.735024 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jun 25 18:06:10.735067 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Jun 25 18:06:10.735110 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Jun 25 18:06:10.735155 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Jun 25 18:06:10.735200 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Jun 25 18:06:10.735247 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Jun 25 18:06:10.735290 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Jun 25 18:06:10.735334 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Jun 25 18:06:10.735377 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Jun 25 18:06:10.735417 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Jun 25 18:06:10.735463 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jun 25 18:06:10.735500 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jun 25 18:06:10.735538 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jun 25 18:06:10.735579 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Jun 25 18:06:10.735618 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Jun 25 18:06:10.735663 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Jun 25 18:06:10.735703 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Jun 25 18:06:10.735752 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Jun 25 18:06:10.735792 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Jun 25 18:06:10.735837 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Jun 25 18:06:10.735880 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Jun 25 18:06:10.735924 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Jun 25 18:06:10.735965 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Jun 25 18:06:10.736007 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Jun 25 18:06:10.736050 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Jun 25 18:06:10.736057 kernel: PCI: CLS 64 bytes, default 64 Jun 25 18:06:10.736063 kernel: DMAR: No ATSR found Jun 25 18:06:10.736069 kernel: DMAR: No SATC found Jun 25 18:06:10.736075 kernel: DMAR: dmar0: Using Queued invalidation Jun 25 18:06:10.736118 kernel: pci 0000:00:00.0: Adding to iommu group 0 Jun 25 18:06:10.736164 kernel: pci 0000:00:01.0: Adding to iommu group 1 Jun 25 18:06:10.736207 kernel: pci 0000:00:08.0: Adding to iommu group 2 Jun 25 18:06:10.736251 kernel: pci 0000:00:12.0: Adding to iommu group 3 Jun 25 18:06:10.736295 kernel: pci 0000:00:14.0: Adding to iommu group 4 Jun 25 18:06:10.736339 kernel: pci 0000:00:14.2: Adding to iommu group 4 Jun 25 18:06:10.736384 kernel: pci 0000:00:15.0: Adding to iommu group 5 Jun 25 18:06:10.736430 kernel: pci 0000:00:15.1: Adding to iommu group 5 Jun 25 18:06:10.736474 kernel: pci 0000:00:16.0: Adding to iommu group 6 Jun 25 18:06:10.736517 kernel: pci 0000:00:16.1: Adding to iommu group 6 Jun 25 18:06:10.736560 kernel: pci 0000:00:16.4: Adding to iommu group 6 Jun 25 18:06:10.736603 kernel: pci 0000:00:17.0: Adding to iommu group 7 Jun 25 18:06:10.736646 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Jun 25 18:06:10.736689 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Jun 25 18:06:10.736735 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Jun 25 18:06:10.736779 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Jun 25 18:06:10.736823 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Jun 25 18:06:10.736866 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Jun 25 18:06:10.736909 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Jun 25 18:06:10.736952 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Jun 25 18:06:10.736995 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Jun 25 18:06:10.737040 kernel: pci 0000:01:00.0: Adding to iommu group 1 Jun 25 18:06:10.737088 kernel: pci 0000:01:00.1: Adding to iommu group 1 Jun 25 18:06:10.737133 kernel: pci 0000:03:00.0: Adding to iommu group 15 Jun 25 18:06:10.737179 kernel: pci 0000:04:00.0: Adding to iommu group 16 Jun 25 18:06:10.737224 kernel: pci 0000:06:00.0: Adding to iommu group 17 Jun 25 18:06:10.737272 kernel: pci 0000:07:00.0: Adding to iommu group 17 Jun 25 18:06:10.737280 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Jun 25 18:06:10.737285 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jun 25 18:06:10.737291 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Jun 25 18:06:10.737296 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Jun 25 18:06:10.737303 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Jun 25 18:06:10.737308 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Jun 25 18:06:10.737314 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Jun 25 18:06:10.737360 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Jun 25 18:06:10.737368 kernel: Initialise system trusted keyrings Jun 25 18:06:10.737373 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Jun 25 18:06:10.737379 kernel: Key type asymmetric registered Jun 25 18:06:10.737384 kernel: Asymmetric key parser 'x509' registered Jun 25 18:06:10.737390 kernel: alg: self-tests for CTR-KDF (hmac(sha256)) passed Jun 25 18:06:10.737396 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jun 25 18:06:10.737401 kernel: io scheduler mq-deadline registered Jun 25 18:06:10.737407 kernel: io scheduler kyber registered Jun 25 18:06:10.737412 kernel: io scheduler bfq registered Jun 25 18:06:10.737458 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Jun 25 18:06:10.737503 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Jun 25 18:06:10.737548 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Jun 25 18:06:10.737593 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Jun 25 18:06:10.737638 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Jun 25 18:06:10.737682 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Jun 25 18:06:10.737730 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Jun 25 18:06:10.737738 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Jun 25 18:06:10.737743 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Jun 25 18:06:10.737749 kernel: pstore: Registered erst as persistent store backend Jun 25 18:06:10.737754 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jun 25 18:06:10.737761 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jun 25 18:06:10.737767 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jun 25 18:06:10.737772 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jun 25 18:06:10.737777 kernel: hpet_acpi_add: no address or irqs in _CRS Jun 25 18:06:10.737824 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Jun 25 18:06:10.737832 kernel: i8042: PNP: No PS/2 controller found. Jun 25 18:06:10.737871 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Jun 25 18:06:10.737911 kernel: rtc_cmos rtc_cmos: registered as rtc0 Jun 25 18:06:10.737953 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-06-25T18:06:09 UTC (1719338769) Jun 25 18:06:10.737992 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Jun 25 18:06:10.737999 kernel: fail to initialize ptp_kvm Jun 25 18:06:10.738005 kernel: intel_pstate: Intel P-state driver initializing Jun 25 18:06:10.738010 kernel: intel_pstate: Disabling energy efficiency optimization Jun 25 18:06:10.738015 kernel: intel_pstate: HWP enabled Jun 25 18:06:10.738021 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Jun 25 18:06:10.738026 kernel: vesafb: scrolling: redraw Jun 25 18:06:10.738031 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Jun 25 18:06:10.738038 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000007cd9dfd7, using 768k, total 768k Jun 25 18:06:10.738044 kernel: Console: switching to colour frame buffer device 128x48 Jun 25 18:06:10.738049 kernel: fb0: VESA VGA frame buffer device Jun 25 18:06:10.738054 kernel: NET: Registered PF_INET6 protocol family Jun 25 18:06:10.738060 kernel: Segment Routing with IPv6 Jun 25 18:06:10.738065 kernel: In-situ OAM (IOAM) with IPv6 Jun 25 18:06:10.738070 kernel: NET: Registered PF_PACKET protocol family Jun 25 18:06:10.738076 kernel: Key type dns_resolver registered Jun 25 18:06:10.738081 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xfa Jun 25 18:06:10.738087 kernel: microcode: Microcode Update Driver: v2.2. Jun 25 18:06:10.738092 kernel: IPI shorthand broadcast: enabled Jun 25 18:06:10.738098 kernel: sched_clock: Marking stable (1652247078, 1368166407)->(4489628030, -1469214545) Jun 25 18:06:10.738103 kernel: registered taskstats version 1 Jun 25 18:06:10.738109 kernel: Loading compiled-in X.509 certificates Jun 25 18:06:10.738114 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.1.95-flatcar: c37bb6ef57220bb1c07535cfcaa08c84d806a137' Jun 25 18:06:10.738119 kernel: Key type .fscrypt registered Jun 25 18:06:10.738124 kernel: Key type fscrypt-provisioning registered Jun 25 18:06:10.738130 kernel: pstore: Using crash dump compression: deflate Jun 25 18:06:10.738136 kernel: ima: Allocated hash algorithm: sha1 Jun 25 18:06:10.738141 kernel: ima: No architecture policies found Jun 25 18:06:10.738147 kernel: clk: Disabling unused clocks Jun 25 18:06:10.738152 kernel: Freeing unused kernel image (initmem) memory: 47156K Jun 25 18:06:10.738157 kernel: Write protecting the kernel read-only data: 34816k Jun 25 18:06:10.738163 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jun 25 18:06:10.738168 kernel: Freeing unused kernel image (rodata/data gap) memory: 488K Jun 25 18:06:10.738174 kernel: Run /init as init process Jun 25 18:06:10.738179 kernel: with arguments: Jun 25 18:06:10.738185 kernel: /init Jun 25 18:06:10.738190 kernel: with environment: Jun 25 18:06:10.738195 kernel: HOME=/ Jun 25 18:06:10.738201 kernel: TERM=linux Jun 25 18:06:10.738206 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jun 25 18:06:10.738212 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jun 25 18:06:10.738219 systemd[1]: Detected architecture x86-64. Jun 25 18:06:10.738226 systemd[1]: Running in initrd. Jun 25 18:06:10.738231 systemd[1]: No hostname configured, using default hostname. Jun 25 18:06:10.738237 systemd[1]: Hostname set to . Jun 25 18:06:10.738242 systemd[1]: Initializing machine ID from random generator. Jun 25 18:06:10.738248 systemd[1]: Queued start job for default target initrd.target. Jun 25 18:06:10.738253 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jun 25 18:06:10.738259 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jun 25 18:06:10.738264 systemd[1]: Reached target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Jun 25 18:06:10.738270 systemd[1]: Reached target paths.target - Path Units. Jun 25 18:06:10.738276 systemd[1]: Reached target slices.target - Slice Units. Jun 25 18:06:10.738281 systemd[1]: Reached target swap.target - Swaps. Jun 25 18:06:10.738287 systemd[1]: Reached target timers.target - Timer Units. Jun 25 18:06:10.738293 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket. Jun 25 18:06:10.738298 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Jun 25 18:06:10.738304 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Jun 25 18:06:10.738310 kernel: clocksource: Switched to clocksource tsc Jun 25 18:06:10.738316 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jun 25 18:06:10.738322 systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Jun 25 18:06:10.738327 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Jun 25 18:06:10.738333 systemd[1]: Listening on systemd-journald.socket - Journal Socket. Jun 25 18:06:10.738338 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jun 25 18:06:10.738344 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jun 25 18:06:10.738349 systemd[1]: Reached target sockets.target - Socket Units. Jun 25 18:06:10.738355 systemd[1]: Starting iscsiuio.service - iSCSI UserSpace I/O driver... Jun 25 18:06:10.738361 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jun 25 18:06:10.738367 kernel: SCSI subsystem initialized Jun 25 18:06:10.738372 systemd[1]: Starting systemd-fsck-usr.service... Jun 25 18:06:10.738377 kernel: Loading iSCSI transport class v2.0-870. Jun 25 18:06:10.738383 systemd[1]: Starting systemd-journald.service - Journal Service... Jun 25 18:06:10.738390 systemd-journald[267]: Journal started Jun 25 18:06:10.738417 systemd-journald[267]: Runtime Journal (/run/log/journal/fc591690a86b4431b5b4e247994b8053) is 8.0M, max 639.9M, 631.9M free. Jun 25 18:06:10.766424 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jun 25 18:06:10.767799 systemd-modules-load[270]: Inserted module 'overlay' Jun 25 18:06:10.797460 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jun 25 18:06:10.797477 systemd[1]: Starting systemd-vconsole-setup.service - Setup Virtual Console... Jun 25 18:06:10.840464 kernel: Bridge firewalling registered Jun 25 18:06:10.857457 systemd[1]: Started iscsiuio.service - iSCSI UserSpace I/O driver. Jun 25 18:06:10.875460 systemd-modules-load[270]: Inserted module 'br_netfilter' Jun 25 18:06:11.023695 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jun 25 18:06:11.023707 kernel: audit: type=1130 audit(1719338770.895:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.023716 systemd[1]: Started systemd-journald.service - Journal Service. Jun 25 18:06:11.023724 kernel: device-mapper: uevent: version 1.0.3 Jun 25 18:06:11.023730 kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Jun 25 18:06:10.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.025991 systemd-modules-load[270]: Inserted module 'dm_multipath' Jun 25 18:06:11.089617 kernel: audit: type=1130 audit(1719338771.033:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.035038 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jun 25 18:06:11.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.099893 systemd[1]: Finished systemd-fsck-usr.service. Jun 25 18:06:11.209622 kernel: audit: type=1130 audit(1719338771.098:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.209635 kernel: audit: type=1130 audit(1719338771.154:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.155802 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jun 25 18:06:11.278665 kernel: audit: type=1130 audit(1719338771.218:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.219819 systemd[1]: Finished systemd-vconsole-setup.service - Setup Virtual Console. Jun 25 18:06:11.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.339467 kernel: audit: type=1130 audit(1719338771.287:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.354811 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Jun 25 18:06:11.355349 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jun 25 18:06:11.355809 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jun 25 18:06:11.356241 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Jun 25 18:06:11.358739 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jun 25 18:06:11.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.359617 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jun 25 18:06:11.463079 kernel: audit: type=1130 audit(1719338771.357:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.463093 kernel: audit: type=1130 audit(1719338771.410:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.411897 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jun 25 18:06:11.536652 kernel: audit: type=1130 audit(1719338771.471:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.472832 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jun 25 18:06:11.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.557773 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Jun 25 18:06:11.576479 dracut-cmdline[300]: dracut-dracut-053 Jun 25 18:06:11.576479 dracut-cmdline[300]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jun 25 18:06:11.576479 dracut-cmdline[300]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=05dd62847a393595c8cf7409b58afa2d4045a2186c3cd58722296be6f3bc4fa9 Jun 25 18:06:11.650427 kernel: iscsi: registered transport (tcp) Jun 25 18:06:11.690837 kernel: iscsi: registered transport (qla4xxx) Jun 25 18:06:11.690853 kernel: QLogic iSCSI HBA Driver Jun 25 18:06:11.727959 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Jun 25 18:06:11.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.745683 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Jun 25 18:06:11.759890 systemd[1]: Starting iscsid.service - Open-iSCSI... Jun 25 18:06:11.776572 systemd[1]: Started iscsid.service - Open-iSCSI. Jun 25 18:06:11.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:11.807537 iscsid[461]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jun 25 18:06:11.807537 iscsid[461]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jun 25 18:06:11.807537 iscsid[461]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jun 25 18:06:11.807537 iscsid[461]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jun 25 18:06:11.807537 iscsid[461]: If using hardware iscsi like qla4xxx this message can be ignored. Jun 25 18:06:11.807537 iscsid[461]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jun 25 18:06:11.807537 iscsid[461]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jun 25 18:06:12.000526 kernel: raid6: avx2x4 gen() 42880 MB/s Jun 25 18:06:12.000538 kernel: raid6: avx2x2 gen() 51316 MB/s Jun 25 18:06:12.000545 kernel: raid6: avx2x1 gen() 44223 MB/s Jun 25 18:06:12.000551 kernel: raid6: using algorithm avx2x2 gen() 51316 MB/s Jun 25 18:06:12.000557 kernel: raid6: .... xor() 31259 MB/s, rmw enabled Jun 25 18:06:12.000564 kernel: raid6: using avx2x2 recovery algorithm Jun 25 18:06:12.000572 kernel: xor: automatically using best checksumming function avx Jun 25 18:06:12.091462 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jun 25 18:06:12.096745 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Jun 25 18:06:12.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:12.105000 audit: BPF prog-id=6 op=LOAD Jun 25 18:06:12.105000 audit: BPF prog-id=7 op=LOAD Jun 25 18:06:12.117720 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jun 25 18:06:12.124860 systemd-udevd[479]: Using default interface naming scheme 'v252'. Jun 25 18:06:12.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:12.127595 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jun 25 18:06:12.181585 dracut-pre-trigger[490]: rd.md=0: removing MD RAID activation Jun 25 18:06:12.156698 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Jun 25 18:06:12.211903 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Jun 25 18:06:12.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:12.231830 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jun 25 18:06:12.323365 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jun 25 18:06:12.362363 kernel: cryptd: max_cpu_qlen set to 1000 Jun 25 18:06:12.362386 kernel: ACPI: bus type USB registered Jun 25 18:06:12.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:12.357348 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Jun 25 18:06:12.492542 kernel: usbcore: registered new interface driver usbfs Jun 25 18:06:12.492556 kernel: usbcore: registered new interface driver hub Jun 25 18:06:12.492563 kernel: usbcore: registered new device driver usb Jun 25 18:06:12.492570 kernel: libata version 3.00 loaded. Jun 25 18:06:12.492577 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Jun 25 18:06:12.492583 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Jun 25 18:06:12.514467 kernel: pps pps0: new PPS source ptp0 Jun 25 18:06:12.514551 kernel: igb 0000:03:00.0: added PHC on eth0 Jun 25 18:06:12.616791 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Jun 25 18:06:12.616871 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:78 Jun 25 18:06:12.616942 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Jun 25 18:06:12.616996 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jun 25 18:06:12.641739 kernel: AVX2 version of gcm_enc/dec engaged. Jun 25 18:06:12.641755 kernel: AES CTR mode by8 optimization enabled Jun 25 18:06:12.641764 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014 Jun 25 18:06:13.590392 kernel: pps pps1: new PPS source ptp1 Jun 25 18:06:13.590491 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jun 25 18:06:13.590553 kernel: igb 0000:04:00.0: added PHC on eth1 Jun 25 18:06:13.590610 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Jun 25 18:06:13.590662 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:79 Jun 25 18:06:13.590714 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Jun 25 18:06:13.590765 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jun 25 18:06:13.590817 kernel: ahci 0000:00:17.0: version 3.0 Jun 25 18:06:13.590868 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jun 25 18:06:13.590921 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Jun 25 18:06:13.590970 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Jun 25 18:06:13.591020 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Jun 25 18:06:13.591068 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Jun 25 18:06:13.591116 kernel: scsi host0: ahci Jun 25 18:06:13.591175 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jun 25 18:06:13.591224 kernel: scsi host1: ahci Jun 25 18:06:13.591279 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Jun 25 18:06:13.591332 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Jun 25 18:06:13.591381 kernel: scsi host2: ahci Jun 25 18:06:13.591444 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Jun 25 18:06:13.591494 kernel: scsi host3: ahci Jun 25 18:06:13.591548 kernel: hub 1-0:1.0: USB hub found Jun 25 18:06:13.591609 kernel: scsi host4: ahci Jun 25 18:06:13.591666 kernel: hub 1-0:1.0: 16 ports detected Jun 25 18:06:13.591722 kernel: scsi host5: ahci Jun 25 18:06:13.591777 kernel: hub 2-0:1.0: USB hub found Jun 25 18:06:13.591834 kernel: scsi host6: ahci Jun 25 18:06:13.591889 kernel: hub 2-0:1.0: 10 ports detected Jun 25 18:06:13.591944 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 137 Jun 25 18:06:13.591953 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Jun 25 18:06:13.592006 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 137 Jun 25 18:06:13.592014 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 137 Jun 25 18:06:13.592020 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Jun 25 18:06:13.781020 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 137 Jun 25 18:06:13.781033 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 137 Jun 25 18:06:13.781040 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 137 Jun 25 18:06:13.781047 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 137 Jun 25 18:06:13.781055 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Jun 25 18:06:13.781121 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jun 25 18:06:13.781174 kernel: hub 1-14:1.0: USB hub found Jun 25 18:06:13.781236 kernel: hub 1-14:1.0: 4 ports detected Jun 25 18:06:13.781293 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jun 25 18:06:13.781347 kernel: ata3: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:13.781354 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014 Jun 25 18:06:14.265889 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jun 25 18:06:14.265901 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jun 25 18:06:14.265973 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:14.265982 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Jun 25 18:06:14.266100 kernel: ata7: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:14.266109 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:14.266117 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Jun 25 18:06:14.266125 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jun 25 18:06:14.266135 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:14.266143 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Jun 25 18:06:14.266150 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jun 25 18:06:14.266158 kernel: ata1.00: Features: NCQ-prio Jun 25 18:06:14.266166 kernel: hid: raw HID events driver (C) Jiri Kosina Jun 25 18:06:14.266174 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jun 25 18:06:14.266181 kernel: ata2.00: Features: NCQ-prio Jun 25 18:06:14.266189 kernel: ata1.00: configured for UDMA/133 Jun 25 18:06:14.266197 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Jun 25 18:06:14.485190 kernel: ata2.00: configured for UDMA/133 Jun 25 18:06:14.485217 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Jun 25 18:06:14.485333 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Jun 25 18:06:14.485441 kernel: usbcore: registered new interface driver usbhid Jun 25 18:06:14.485455 kernel: port_module: 10 callbacks suppressed Jun 25 18:06:14.485468 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Jun 25 18:06:14.485564 kernel: usbhid: USB HID core driver Jun 25 18:06:14.485588 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jun 25 18:06:14.485697 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Jun 25 18:06:14.485704 kernel: ata2.00: Enabling discard_zeroes_data Jun 25 18:06:14.485711 kernel: ata1.00: Enabling discard_zeroes_data Jun 25 18:06:14.485717 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jun 25 18:06:14.485790 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jun 25 18:06:14.485890 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Jun 25 18:06:14.485977 kernel: sd 1:0:0:0: [sda] Write Protect is off Jun 25 18:06:14.486045 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Jun 25 18:06:14.486106 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Jun 25 18:06:14.486187 kernel: sd 0:0:0:0: [sdb] Write Protect is off Jun 25 18:06:14.486289 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Jun 25 18:06:14.486403 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Jun 25 18:06:14.486416 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Jun 25 18:06:14.486549 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jun 25 18:06:14.486686 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Jun 25 18:06:14.486868 kernel: sd 1:0:0:0: [sda] Preferred minimum I/O size 4096 bytes Jun 25 18:06:14.486972 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jun 25 18:06:14.487113 kernel: ata2.00: Enabling discard_zeroes_data Jun 25 18:06:14.487138 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jun 25 18:06:14.487222 kernel: sd 0:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Jun 25 18:06:14.487281 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Jun 25 18:06:14.487337 kernel: ata1.00: Enabling discard_zeroes_data Jun 25 18:06:14.487345 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Jun 25 18:06:14.487351 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Jun 25 18:06:14.514858 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Micron_5200_MTFDDAK480TDN ROOT. Jun 25 18:06:14.591684 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Jun 25 18:06:14.591985 kernel: BTRFS: device fsid dda7891e-deba-495b-b677-4df6bea75326 devid 1 transid 33 /dev/sdb3 scanned by (udev-worker) (547) Jun 25 18:06:14.592019 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sdb6 scanned by (udev-worker) (559) Jun 25 18:06:14.592044 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Jun 25 18:06:14.585676 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Micron_5200_MTFDDAK480TDN USR-A. Jun 25 18:06:14.629532 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Micron_5200_MTFDDAK480TDN USR-A. Jun 25 18:06:14.651927 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Jun 25 18:06:14.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.690164 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5200_MTFDDAK480TDN OEM. Jun 25 18:06:14.753506 kernel: audit: type=1130 audit(1719338774.675:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.744328 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Jun 25 18:06:14.763563 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Jun 25 18:06:14.773547 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jun 25 18:06:14.773667 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jun 25 18:06:14.814818 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary... Jun 25 18:06:14.834398 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Jun 25 18:06:14.977536 kernel: audit: type=1130 audit(1719338774.872:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.977548 kernel: audit: type=1131 audit(1719338774.872:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.853203 systemd[1]: disk-uuid.service: Deactivated successfully. Jun 25 18:06:14.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.853388 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary. Jun 25 18:06:15.065621 kernel: audit: type=1130 audit(1719338774.987:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.874267 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Jun 25 18:06:14.988525 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Jun 25 18:06:15.047455 systemd[1]: Reached target local-fs.target - Local File Systems. Jun 25 18:06:15.047489 systemd[1]: Reached target sysinit.target - System Initialization. Jun 25 18:06:15.076626 systemd[1]: Reached target basic.target - Basic System. Jun 25 18:06:15.099674 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT... Jun 25 18:06:15.105289 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr... Jun 25 18:06:15.108155 sh[704]: Success Jun 25 18:06:15.117124 systemd-fsck[706]: ROOT: clean, 75/553520 files, 52711/553472 blocks Jun 25 18:06:15.144482 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jun 25 18:06:15.178052 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT. Jun 25 18:06:15.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.240497 kernel: audit: type=1130 audit(1719338775.186:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.254640 systemd[1]: Mounting sysroot.mount - /sysroot... Jun 25 18:06:15.262995 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr. Jun 25 18:06:15.279730 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr. Jun 25 18:06:15.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.351428 kernel: audit: type=1130 audit(1719338775.298:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.356557 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr... Jun 25 18:06:15.383447 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Quota mode: none. Jun 25 18:06:15.383727 systemd[1]: Mounted sysroot.mount - /sysroot. Jun 25 18:06:15.523838 kernel: BTRFS info (device dm-0): first mount of filesystem dda7891e-deba-495b-b677-4df6bea75326 Jun 25 18:06:15.523923 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm Jun 25 18:06:15.523931 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead Jun 25 18:06:15.523937 kernel: BTRFS info (device dm-0): disabling log replay at mount time Jun 25 18:06:15.523944 kernel: BTRFS info (device dm-0): using free space tree Jun 25 18:06:15.523951 kernel: BTRFS info (device dm-0): enabling ssd optimizations Jun 25 18:06:15.401563 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Jun 25 18:06:15.542650 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Jun 25 18:06:15.578469 kernel: BTRFS info (device sdb6): first mount of filesystem 86bb1873-22f4-4b9b-84d4-c8e8b30f7c8f Jun 25 18:06:15.578485 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Jun 25 18:06:15.589910 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr. Jun 25 18:06:15.655628 kernel: BTRFS info (device sdb6): using free space tree Jun 25 18:06:15.655640 kernel: BTRFS info (device sdb6): enabling ssd optimizations Jun 25 18:06:15.653670 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr... Jun 25 18:06:15.664257 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Jun 25 18:06:15.679854 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr. Jun 25 18:06:15.703672 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup... Jun 25 18:06:15.811865 initrd-setup-root[776]: cut: /sysroot/etc/passwd: No such file or directory Jun 25 18:06:15.822646 initrd-setup-root[783]: cut: /sysroot/etc/group: No such file or directory Jun 25 18:06:15.832607 initrd-setup-root[790]: cut: /sysroot/etc/shadow: No such file or directory Jun 25 18:06:15.842626 initrd-setup-root[797]: cut: /sysroot/etc/gshadow: No such file or directory Jun 25 18:06:16.183647 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup. Jun 25 18:06:16.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.257477 kernel: audit: type=1130 audit(1719338776.193:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.268740 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion... Jun 25 18:06:16.274211 initrd-setup-root-after-ignition[941]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jun 25 18:06:16.274211 initrd-setup-root-after-ignition[941]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory Jun 25 18:06:16.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.358830 initrd-setup-root-after-ignition[945]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jun 25 18:06:16.384638 kernel: audit: type=1130 audit(1719338776.301:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.288777 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion. Jun 25 18:06:16.302853 systemd[1]: Reached target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Jun 25 18:06:16.378714 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root... Jun 25 18:06:16.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.407554 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jun 25 18:06:16.512557 kernel: audit: type=1130 audit(1719338776.430:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.407616 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root. Jun 25 18:06:16.431712 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Jun 25 18:06:16.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.495616 systemd[1]: Reached target initrd.target - Initrd Default Target. Jun 25 18:06:16.495677 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met. Jun 25 18:06:16.511785 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Jun 25 18:06:16.523867 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jun 25 18:06:16.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.555676 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Jun 25 18:06:16.571751 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Jun 25 18:06:16.585669 systemd[1]: Stopped target timers.target - Timer Units. Jun 25 18:06:16.607877 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jun 25 18:06:16.608039 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jun 25 18:06:16.631136 systemd[1]: Stopped target initrd.target - Initrd Default Target. Jun 25 18:06:16.653043 systemd[1]: Stopped target basic.target - Basic System. Jun 25 18:06:16.674046 systemd[1]: Stopped target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Jun 25 18:06:16.694154 systemd[1]: Stopped target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Jun 25 18:06:16.713049 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Jun 25 18:06:16.732039 systemd[1]: Stopped target paths.target - Path Units. Jun 25 18:06:16.753176 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Jun 25 18:06:16.773036 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Jun 25 18:06:16.792036 systemd[1]: Stopped target slices.target - Slice Units. Jun 25 18:06:16.812157 systemd[1]: Stopped target sockets.target - Socket Units. Jun 25 18:06:16.835154 systemd[1]: Stopped target sysinit.target - System Initialization. Jun 25 18:06:16.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.856200 systemd[1]: Stopped target local-fs.target - Local File Systems. Jun 25 18:06:16.876167 systemd[1]: Stopped target local-fs-pre.target - Preparation for Local File Systems. Jun 25 18:06:16.896035 systemd[1]: Stopped target swap.target - Swaps. Jun 25 18:06:17.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.917091 systemd[1]: iscsid.socket: Deactivated successfully. Jun 25 18:06:17.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.917400 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket. Jun 25 18:06:17.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.936058 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jun 25 18:06:16.936476 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Jun 25 18:06:17.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.955258 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Jun 25 18:06:17.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.974895 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jun 25 18:06:17.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.975347 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jun 25 18:06:17.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.994922 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jun 25 18:06:17.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.995330 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Jun 25 18:06:17.017171 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jun 25 18:06:17.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.017614 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion. Jun 25 18:06:17.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.035122 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jun 25 18:06:17.035541 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup. Jun 25 18:06:17.054569 systemd[1]: Stopping iscsiuio.service - iSCSI UserSpace I/O driver... Jun 25 18:06:17.071680 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jun 25 18:06:17.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.072156 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Jun 25 18:06:17.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.091211 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jun 25 18:06:17.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.091635 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Jun 25 18:06:17.111118 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jun 25 18:06:17.111534 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jun 25 18:06:17.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.131216 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jun 25 18:06:17.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.131636 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Jun 25 18:06:17.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.151135 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jun 25 18:06:17.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.151557 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Jun 25 18:06:17.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.174610 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Jun 25 18:06:17.199096 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Jun 25 18:06:17.199283 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jun 25 18:06:17.201605 systemd[1]: iscsiuio.service: Deactivated successfully. Jun 25 18:06:17.201821 systemd[1]: Stopped iscsiuio.service - iSCSI UserSpace I/O driver. Jun 25 18:06:17.213632 systemd[1]: systemd-udevd.service: Deactivated successfully. Jun 25 18:06:17.592910 iscsid[461]: iscsid shutting down. Jun 25 18:06:17.213937 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Jun 25 18:06:17.234097 systemd[1]: iscsiuio.socket: Deactivated successfully. Jun 25 18:06:17.234344 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jun 25 18:06:17.253812 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jun 25 18:06:17.253915 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Jun 25 18:06:17.273774 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jun 25 18:06:17.273875 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Jun 25 18:06:17.294733 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jun 25 18:06:17.294874 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Jun 25 18:06:17.314806 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jun 25 18:06:17.314942 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Jun 25 18:06:17.332814 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jun 25 18:06:17.332950 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jun 25 18:06:17.367882 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Jun 25 18:06:17.382615 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jun 25 18:06:17.382643 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jun 25 18:06:17.400725 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jun 25 18:06:17.400771 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Jun 25 18:06:17.421679 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jun 25 18:06:17.421744 systemd[1]: Stopped systemd-vconsole-setup.service - Setup Virtual Console. Jun 25 18:06:17.443854 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jun 25 18:06:17.445193 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jun 25 18:06:17.445411 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Jun 25 18:06:17.462396 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jun 25 18:06:17.462632 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Jun 25 18:06:17.593425 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Jun 25 18:06:17.483911 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Jun 25 18:06:17.512865 systemd[1]: Starting initrd-switch-root.service - Switch Root... Jun 25 18:06:17.543122 systemd[1]: Switching root. Jun 25 18:06:17.593543 systemd-journald[267]: Journal stopped Jun 25 18:06:20.513043 kernel: SELinux: Permission cmd in class io_uring not defined in policy. Jun 25 18:06:20.513056 kernel: SELinux: the above unknown classes and permissions will be allowed Jun 25 18:06:20.513064 kernel: SELinux: policy capability network_peer_controls=1 Jun 25 18:06:20.513070 kernel: SELinux: policy capability open_perms=1 Jun 25 18:06:20.513076 kernel: SELinux: policy capability extended_socket_class=1 Jun 25 18:06:20.513081 kernel: SELinux: policy capability always_check_network=0 Jun 25 18:06:20.513087 kernel: SELinux: policy capability cgroup_seclabel=1 Jun 25 18:06:20.513093 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jun 25 18:06:20.513098 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jun 25 18:06:20.513103 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jun 25 18:06:20.513109 systemd[1]: Successfully loaded SELinux policy in 255.532ms. Jun 25 18:06:20.513117 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.774ms. Jun 25 18:06:20.513124 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jun 25 18:06:20.513130 systemd[1]: Detected architecture x86-64. Jun 25 18:06:20.513137 systemd[1]: Detected first boot. Jun 25 18:06:20.513144 systemd[1]: Hostname set to . Jun 25 18:06:20.513151 systemd[1]: Initializing machine ID from random generator. Jun 25 18:06:20.513157 systemd[1]: Populated /etc with preset unit settings. Jun 25 18:06:20.513163 systemd[1]: iscsid.service: Deactivated successfully. Jun 25 18:06:20.513169 systemd[1]: Stopped iscsid.service - Open-iSCSI. Jun 25 18:06:20.513175 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jun 25 18:06:20.513182 systemd[1]: Stopped initrd-switch-root.service - Switch Root. Jun 25 18:06:20.513188 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jun 25 18:06:20.513196 systemd[1]: Created slice system-addon\x2dconfig.slice - Slice /system/addon-config. Jun 25 18:06:20.513203 systemd[1]: Created slice system-addon\x2drun.slice - Slice /system/addon-run. Jun 25 18:06:20.513210 systemd[1]: Created slice system-getty.slice - Slice /system/getty. Jun 25 18:06:20.513216 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Jun 25 18:06:20.513222 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Jun 25 18:06:20.513228 systemd[1]: Created slice system-system\x2dcloudinit.slice - Slice /system/system-cloudinit. Jun 25 18:06:20.513234 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Jun 25 18:06:20.513241 systemd[1]: Created slice user.slice - User and Session Slice. Jun 25 18:06:20.513248 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jun 25 18:06:20.513254 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Jun 25 18:06:20.513261 systemd[1]: Set up automount boot.automount - Boot partition Automount Point. Jun 25 18:06:20.513267 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Jun 25 18:06:20.513273 systemd[1]: Stopped target initrd-switch-root.target - Switch Root. Jun 25 18:06:20.513279 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems. Jun 25 18:06:20.513285 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System. Jun 25 18:06:20.513292 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Jun 25 18:06:20.513299 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jun 25 18:06:20.513307 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jun 25 18:06:20.513314 systemd[1]: Reached target slices.target - Slice Units. Jun 25 18:06:20.513320 systemd[1]: Reached target swap.target - Swaps. Jun 25 18:06:20.513327 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Jun 25 18:06:20.513333 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket. Jun 25 18:06:20.513340 systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Jun 25 18:06:20.513347 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Jun 25 18:06:20.513354 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jun 25 18:06:20.513360 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jun 25 18:06:20.513367 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket. Jun 25 18:06:20.513373 systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Jun 25 18:06:20.513381 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Jun 25 18:06:20.513388 systemd[1]: Mounting media.mount - External Media Directory... Jun 25 18:06:20.513395 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:20.513401 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Jun 25 18:06:20.513408 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Jun 25 18:06:20.513415 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... Jun 25 18:06:20.513424 systemd[1]: Starting flatcar-tmpfiles.service - Create missing system files... Jun 25 18:06:20.513432 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jun 25 18:06:20.513439 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jun 25 18:06:20.513446 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Jun 25 18:06:20.513453 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jun 25 18:06:20.513459 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jun 25 18:06:20.513466 kernel: ACPI: bus type drm_connector registered Jun 25 18:06:20.513473 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jun 25 18:06:20.513479 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Jun 25 18:06:20.513486 kernel: fuse: init (API version 7.37) Jun 25 18:06:20.513493 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jun 25 18:06:20.513500 kernel: loop: module loaded Jun 25 18:06:20.513506 systemd[1]: setup-nsswitch.service - Create /etc/nsswitch.conf was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jun 25 18:06:20.513513 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jun 25 18:06:20.513520 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device. Jun 25 18:06:20.513526 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jun 25 18:06:20.513533 kernel: kauditd_printk_skb: 40 callbacks suppressed Jun 25 18:06:20.513539 kernel: audit: type=1131 audit(1719338780.098:69): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.513547 systemd[1]: Stopped systemd-fsck-usr.service. Jun 25 18:06:20.513554 kernel: audit: type=1131 audit(1719338780.209:70): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.513561 systemd[1]: Stopped systemd-journald.service - Journal Service. Jun 25 18:06:20.513567 kernel: audit: type=1130 audit(1719338780.289:71): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.513573 kernel: audit: type=1131 audit(1719338780.289:72): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.513579 kernel: audit: type=1334 audit(1719338780.289:73): prog-id=13 op=LOAD Jun 25 18:06:20.513585 kernel: audit: type=1334 audit(1719338780.339:74): prog-id=14 op=LOAD Jun 25 18:06:20.513592 kernel: audit: type=1334 audit(1719338780.390:75): prog-id=15 op=LOAD Jun 25 18:06:20.513598 kernel: audit: type=1334 audit(1719338780.411:76): prog-id=11 op=UNLOAD Jun 25 18:06:20.513604 kernel: audit: type=1334 audit(1719338780.411:77): prog-id=12 op=UNLOAD Jun 25 18:06:20.513610 systemd[1]: Starting systemd-journald.service - Journal Service... Jun 25 18:06:20.513617 kernel: audit: type=1305 audit(1719338780.509:78): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jun 25 18:06:20.513624 systemd-journald[1075]: Journal started Jun 25 18:06:20.513648 systemd-journald[1075]: Runtime Journal (/run/log/journal/271a7cb09e334196bf1f74872bef7598) is 8.0M, max 639.9M, 631.9M free. Jun 25 18:06:17.871000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jun 25 18:06:18.121000 audit: BPF prog-id=8 op=LOAD Jun 25 18:06:18.121000 audit: BPF prog-id=8 op=UNLOAD Jun 25 18:06:18.121000 audit: BPF prog-id=9 op=LOAD Jun 25 18:06:18.121000 audit: BPF prog-id=9 op=UNLOAD Jun 25 18:06:18.458000 audit: BPF prog-id=10 op=LOAD Jun 25 18:06:18.458000 audit: BPF prog-id=3 op=UNLOAD Jun 25 18:06:18.458000 audit: BPF prog-id=11 op=LOAD Jun 25 18:06:18.458000 audit: BPF prog-id=12 op=LOAD Jun 25 18:06:18.458000 audit: BPF prog-id=4 op=UNLOAD Jun 25 18:06:18.458000 audit: BPF prog-id=5 op=UNLOAD Jun 25 18:06:18.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:18.500000 audit: BPF prog-id=10 op=UNLOAD Jun 25 18:06:18.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:18.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:18.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.289000 audit: BPF prog-id=13 op=LOAD Jun 25 18:06:20.339000 audit: BPF prog-id=14 op=LOAD Jun 25 18:06:20.390000 audit: BPF prog-id=15 op=LOAD Jun 25 18:06:20.411000 audit: BPF prog-id=11 op=UNLOAD Jun 25 18:06:20.411000 audit: BPF prog-id=12 op=UNLOAD Jun 25 18:06:20.509000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jun 25 18:06:18.448999 systemd[1]: Queued start job for default target multi-user.target. Jun 25 18:06:18.449005 systemd[1]: Unnecessary job was removed for dev-sdb6.device - /dev/sdb6. Jun 25 18:06:18.460410 systemd[1]: systemd-journald.service: Deactivated successfully. Jun 25 18:06:20.509000 audit[1075]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc7b305790 a2=4000 a3=7ffc7b30582c items=0 ppid=1 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:20.509000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jun 25 18:06:20.600594 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jun 25 18:06:20.636487 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Jun 25 18:06:20.681595 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Jun 25 18:06:20.715487 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jun 25 18:06:20.751232 systemd[1]: verity-setup.service: Deactivated successfully. Jun 25 18:06:20.751255 systemd[1]: Stopped verity-setup.service. Jun 25 18:06:20.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.818467 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:20.841599 systemd[1]: Started systemd-journald.service - Journal Service. Jun 25 18:06:20.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.851054 systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Jun 25 18:06:20.861677 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Jun 25 18:06:20.871673 systemd[1]: Mounted media.mount - External Media Directory. Jun 25 18:06:20.881668 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Jun 25 18:06:20.891643 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Jun 25 18:06:20.901654 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp. Jun 25 18:06:20.909790 systemd[1]: Finished flatcar-tmpfiles.service - Create missing system files. Jun 25 18:06:20.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.919865 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jun 25 18:06:20.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.929987 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jun 25 18:06:20.930210 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Jun 25 18:06:20.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.940292 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jun 25 18:06:20.940652 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jun 25 18:06:20.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.951316 systemd[1]: modprobe@drm.service: Deactivated successfully. Jun 25 18:06:20.951675 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jun 25 18:06:20.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.962307 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jun 25 18:06:20.962665 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jun 25 18:06:20.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.973313 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jun 25 18:06:20.973671 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Jun 25 18:06:20.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.984286 systemd[1]: modprobe@loop.service: Deactivated successfully. Jun 25 18:06:20.984642 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jun 25 18:06:20.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.995263 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jun 25 18:06:21.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.005262 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Jun 25 18:06:21.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.015248 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Jun 25 18:06:21.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.026257 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jun 25 18:06:21.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.036805 systemd[1]: Reached target network-pre.target - Preparation for Network. Jun 25 18:06:21.063905 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Jun 25 18:06:21.075339 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Jun 25 18:06:21.086606 systemd[1]: remount-root.service - Remount Root File System was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jun 25 18:06:21.087639 systemd[1]: Starting systemd-hwdb-update.service - Rebuild Hardware Database... Jun 25 18:06:21.098329 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Jun 25 18:06:21.101941 systemd-journald[1075]: Time spent on flushing to /var/log/journal/271a7cb09e334196bf1f74872bef7598 is 10.421ms for 1251 entries. Jun 25 18:06:21.101941 systemd-journald[1075]: System Journal (/var/log/journal/271a7cb09e334196bf1f74872bef7598) is 8.0M, max 195.6M, 187.6M free. Jun 25 18:06:21.142871 systemd-journald[1075]: Received client request to flush runtime journal. Jun 25 18:06:21.115590 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jun 25 18:06:21.116231 systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Jun 25 18:06:21.135559 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jun 25 18:06:21.136238 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jun 25 18:06:21.146369 systemd[1]: Starting systemd-sysusers.service - Create System Users... Jun 25 18:06:21.157259 systemd[1]: Starting systemd-udev-settle.service - Wait for udev To Complete Device Initialization... Jun 25 18:06:21.167673 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Jun 25 18:06:21.177585 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Jun 25 18:06:21.187632 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Jun 25 18:06:21.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.197631 systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Jun 25 18:06:21.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.207628 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jun 25 18:06:21.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.217656 systemd[1]: Finished systemd-sysusers.service - Create System Users. Jun 25 18:06:21.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.228682 systemd[1]: Reached target first-boot-complete.target - First Boot Complete. Jun 25 18:06:21.249675 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jun 25 18:06:21.261651 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jun 25 18:06:21.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.272819 udevadm[1093]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jun 25 18:06:21.448869 systemd[1]: Finished systemd-hwdb-update.service - Rebuild Hardware Database. Jun 25 18:06:21.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.458000 audit: BPF prog-id=16 op=LOAD Jun 25 18:06:21.458000 audit: BPF prog-id=17 op=LOAD Jun 25 18:06:21.458000 audit: BPF prog-id=6 op=UNLOAD Jun 25 18:06:21.458000 audit: BPF prog-id=7 op=UNLOAD Jun 25 18:06:21.467756 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jun 25 18:06:21.479062 systemd-udevd[1097]: Using default interface naming scheme 'v252'. Jun 25 18:06:21.493724 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jun 25 18:06:21.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.506223 systemd[1]: Condition check resulted in dev-ttyS1.device - /dev/ttyS1 being skipped. Jun 25 18:06:21.505000 audit: BPF prog-id=18 op=LOAD Jun 25 18:06:21.519437 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Jun 25 18:06:21.519530 kernel: BTRFS info: devid 1 device path /dev/mapper/usr changed to /dev/dm-0 scanned by (udev-worker) (1099) Jun 25 18:06:21.519549 kernel: ACPI: button: Sleep Button [SLPB] Jun 25 18:06:21.530437 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 33 scanned by (udev-worker) (1103) Jun 25 18:06:21.543698 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Jun 25 18:06:21.632572 systemd[1]: Starting systemd-networkd.service - Network Configuration... Jun 25 18:06:21.648581 kernel: mousedev: PS/2 mouse device common for all mice Jun 25 18:06:21.648610 kernel: ACPI: button: Power Button [PWRF] Jun 25 18:06:21.689433 kernel: IPMI message handler: version 39.2 Jun 25 18:06:21.713433 kernel: ipmi device interface Jun 25 18:06:21.718553 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5200_MTFDDAK480TDN OEM. Jun 25 18:06:21.736476 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Jun 25 18:06:21.782819 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Jun 25 18:06:21.782947 kernel: i2c i2c-0: 1/4 memory slots populated (from DMI) Jun 25 18:06:21.783043 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Jun 25 18:06:21.788239 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Jun 25 18:06:21.751000 audit: BPF prog-id=19 op=LOAD Jun 25 18:06:21.751000 audit: BPF prog-id=20 op=LOAD Jun 25 18:06:21.751000 audit: BPF prog-id=21 op=LOAD Jun 25 18:06:21.781612 systemd[1]: Starting systemd-userdbd.service - User Database Manager... Jun 25 18:06:21.839693 kernel: iTCO_vendor_support: vendor-support=0 Jun 25 18:06:21.839720 kernel: ipmi_si: IPMI System Interface driver Jun 25 18:06:21.843839 systemd[1]: Started systemd-userdbd.service - User Database Manager. Jun 25 18:06:21.873506 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Jun 25 18:06:21.927910 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Jun 25 18:06:21.927930 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Jun 25 18:06:21.927944 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Jun 25 18:06:22.052175 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Jun 25 18:06:22.052256 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Jun 25 18:06:22.052325 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Jun 25 18:06:22.052383 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Jun 25 18:06:22.052450 kernel: ipmi_si: Adding ACPI-specified kcs state machine Jun 25 18:06:22.052463 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Jun 25 18:06:21.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.085622 systemd-networkd[1141]: bond0: netdev ready Jun 25 18:06:22.088766 systemd-networkd[1141]: lo: Link UP Jun 25 18:06:22.088768 systemd-networkd[1141]: lo: Gained carrier Jun 25 18:06:22.089095 systemd-networkd[1141]: Enumeration completed Jun 25 18:06:22.089152 systemd[1]: Started systemd-networkd.service - Network Configuration. Jun 25 18:06:22.089395 systemd-networkd[1141]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Jun 25 18:06:22.099441 systemd-networkd[1141]: enp1s0f1np1: Configuring with /etc/systemd/network/10-b8:59:9f:e1:64:0f.network. Jun 25 18:06:22.110473 kernel: intel_rapl_common: Found RAPL domain package Jun 25 18:06:22.110498 kernel: intel_rapl_common: Found RAPL domain core Jun 25 18:06:22.110515 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Jun 25 18:06:22.110602 kernel: intel_rapl_common: Found RAPL domain dram Jun 25 18:06:22.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.162424 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Jun 25 18:06:22.204550 systemd[1]: Starting systemd-networkd-wait-online.service - Wait for Network to be Configured... Jun 25 18:06:22.271426 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Jun 25 18:06:22.291424 kernel: ipmi_ssif: IPMI SSIF Interface driver Jun 25 18:06:22.294736 systemd[1]: Finished systemd-udev-settle.service - Wait for udev To Complete Device Initialization. Jun 25 18:06:22.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.310609 systemd[1]: Starting lvm2-activation-early.service - Activation of LVM2 logical volumes... Jun 25 18:06:22.316760 lvm[1204]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jun 25 18:06:22.354854 systemd[1]: Finished lvm2-activation-early.service - Activation of LVM2 logical volumes. Jun 25 18:06:22.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.364562 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jun 25 18:06:22.385575 systemd[1]: Starting lvm2-activation.service - Activation of LVM2 logical volumes... Jun 25 18:06:22.387723 lvm[1205]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jun 25 18:06:22.418897 systemd[1]: Finished lvm2-activation.service - Activation of LVM2 logical volumes. Jun 25 18:06:22.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.429550 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Jun 25 18:06:22.440501 systemd[1]: var-lib-machines.mount - Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jun 25 18:06:22.440515 systemd[1]: Reached target local-fs.target - Local File Systems. Jun 25 18:06:22.450500 systemd[1]: Reached target machines.target - Containers. Jun 25 18:06:22.465559 systemd[1]: Starting ldconfig.service - Rebuild Dynamic Linker Cache... Jun 25 18:06:22.475824 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jun 25 18:06:22.475849 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:22.476562 systemd[1]: Starting systemd-boot-update.service - Automatic Boot Loader Update... Jun 25 18:06:22.487163 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM... Jun 25 18:06:22.497432 systemd[1]: Starting systemd-machine-id-commit.service - Commit a transient machine-id on disk... Jun 25 18:06:22.498666 systemd[1]: Starting systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/... Jun 25 18:06:22.498882 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1208 (bootctl) Jun 25 18:06:22.499743 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service - File System Check on /dev/disk/by-label/EFI-SYSTEM... Jun 25 18:06:22.521135 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM. Jun 25 18:06:22.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.521425 kernel: loop0: detected capacity change from 0 to 8 Jun 25 18:06:22.523264 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jun 25 18:06:22.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.523793 systemd[1]: Finished systemd-machine-id-commit.service - Commit a transient machine-id on disk. Jun 25 18:06:22.544425 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jun 25 18:06:22.577224 systemd-fsck[1221]: fsck.fat 4.2 (2021-01-31) Jun 25 18:06:22.577224 systemd-fsck[1221]: /dev/sdb1: 808 files, 120378/258078 clusters Jun 25 18:06:22.578000 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service - File System Check on /dev/disk/by-label/EFI-SYSTEM. Jun 25 18:06:22.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.597430 kernel: loop1: detected capacity change from 0 to 139360 Jun 25 18:06:22.615567 systemd[1]: Mounting boot.mount - Boot partition... Jun 25 18:06:22.641382 systemd[1]: Mounted boot.mount - Boot partition. Jun 25 18:06:22.666426 kernel: loop2: detected capacity change from 0 to 80584 Jun 25 18:06:22.667277 systemd[1]: Finished systemd-boot-update.service - Automatic Boot Loader Update. Jun 25 18:06:22.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.725428 kernel: loop3: detected capacity change from 0 to 8 Jun 25 18:06:22.742424 kernel: loop4: detected capacity change from 0 to 139360 Jun 25 18:06:22.759503 ldconfig[1207]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jun 25 18:06:22.760539 systemd[1]: Finished ldconfig.service - Rebuild Dynamic Linker Cache. Jun 25 18:06:22.772423 kernel: loop5: detected capacity change from 0 to 80584 Jun 25 18:06:22.777466 (sd-sysext)[1232]: Using extensions 'containerd-flatcar', 'docker-flatcar', 'oem-packet'. Jun 25 18:06:22.777677 (sd-sysext)[1232]: Merged extensions into '/usr'. Jun 25 18:06:22.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.783343 systemd[1]: Finished systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/. Jun 25 18:06:22.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.802602 systemd[1]: Starting ensure-sysext.service... Jun 25 18:06:22.810179 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Jun 25 18:06:22.815721 systemd-tmpfiles[1234]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jun 25 18:06:22.816546 systemd-tmpfiles[1234]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jun 25 18:06:22.816739 systemd-tmpfiles[1234]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Jun 25 18:06:22.817217 systemd-tmpfiles[1234]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jun 25 18:06:22.825601 systemd[1]: Reloading. Jun 25 18:06:22.904096 systemd[1]: /usr/lib/systemd/system/docker.socket:6: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jun 25 18:06:22.956000 audit: BPF prog-id=22 op=LOAD Jun 25 18:06:22.956000 audit: BPF prog-id=19 op=UNLOAD Jun 25 18:06:22.956000 audit: BPF prog-id=23 op=LOAD Jun 25 18:06:22.956000 audit: BPF prog-id=24 op=LOAD Jun 25 18:06:22.956000 audit: BPF prog-id=20 op=UNLOAD Jun 25 18:06:22.956000 audit: BPF prog-id=21 op=UNLOAD Jun 25 18:06:22.957000 audit: BPF prog-id=25 op=LOAD Jun 25 18:06:22.957000 audit: BPF prog-id=18 op=UNLOAD Jun 25 18:06:22.957000 audit: BPF prog-id=26 op=LOAD Jun 25 18:06:22.957000 audit: BPF prog-id=13 op=UNLOAD Jun 25 18:06:22.957000 audit: BPF prog-id=27 op=LOAD Jun 25 18:06:22.957000 audit: BPF prog-id=28 op=LOAD Jun 25 18:06:22.957000 audit: BPF prog-id=14 op=UNLOAD Jun 25 18:06:22.957000 audit: BPF prog-id=15 op=UNLOAD Jun 25 18:06:22.958000 audit: BPF prog-id=29 op=LOAD Jun 25 18:06:22.958000 audit: BPF prog-id=30 op=LOAD Jun 25 18:06:22.958000 audit: BPF prog-id=16 op=UNLOAD Jun 25 18:06:22.958000 audit: BPF prog-id=17 op=UNLOAD Jun 25 18:06:22.961345 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jun 25 18:06:22.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.972582 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Jun 25 18:06:22.984710 systemd[1]: Starting clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs... Jun 25 18:06:22.989000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jun 25 18:06:22.989000 audit[1323]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4f83ba90 a2=420 a3=0 items=0 ppid=1307 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:22.989000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jun 25 18:06:22.990745 augenrules[1323]: No rules Jun 25 18:06:22.995471 systemd[1]: Starting systemd-journal-catalog-update.service - Rebuild Journal Catalog... Jun 25 18:06:23.005675 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Jun 25 18:06:23.016566 systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Jun 25 18:06:23.027230 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Jun 25 18:06:23.036815 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Jun 25 18:06:23.046640 systemd[1]: Finished clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs. Jun 25 18:06:23.056621 systemd[1]: Finished systemd-journal-catalog-update.service - Rebuild Journal Catalog. Jun 25 18:06:23.078301 systemd[1]: Starting systemd-update-done.service - Update is Completed... Jun 25 18:06:23.088466 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jun 25 18:06:23.089011 systemd[1]: Finished systemd-update-done.service - Update is Completed. Jun 25 18:06:23.099702 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Jun 25 18:06:23.105858 systemd-resolved[1329]: Positive Trust Anchors: Jun 25 18:06:23.105863 systemd-resolved[1329]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jun 25 18:06:23.105884 systemd-resolved[1329]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jun 25 18:06:23.108573 systemd-resolved[1329]: Using system hostname 'ci-3815.2.4-a-026c8d53da'. Jun 25 18:06:23.110714 systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Jun 25 18:06:23.121161 systemd[1]: Reached target time-set.target - System Time Set. Jun 25 18:06:23.131529 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.131675 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jun 25 18:06:23.139591 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jun 25 18:06:23.151176 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jun 25 18:06:23.161163 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jun 25 18:06:23.176521 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jun 25 18:06:23.176593 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:23.176658 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jun 25 18:06:23.176705 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.177290 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jun 25 18:06:23.177361 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jun 25 18:06:23.180447 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jun 25 18:06:23.197712 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jun 25 18:06:23.197777 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jun 25 18:06:23.206424 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Jun 25 18:06:23.215714 systemd[1]: modprobe@loop.service: Deactivated successfully. Jun 25 18:06:23.215779 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jun 25 18:06:23.219252 systemd-networkd[1141]: enp1s0f0np0: Configuring with /etc/systemd/network/10-b8:59:9f:e1:64:0e.network. Jun 25 18:06:23.226490 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.226631 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jun 25 18:06:23.238633 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jun 25 18:06:23.259189 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jun 25 18:06:23.264468 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jun 25 18:06:23.274148 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jun 25 18:06:23.284523 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jun 25 18:06:23.284591 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:23.284650 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jun 25 18:06:23.284696 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.285249 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jun 25 18:06:23.285326 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jun 25 18:06:23.294704 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jun 25 18:06:23.294772 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jun 25 18:06:23.304690 systemd[1]: modprobe@loop.service: Deactivated successfully. Jun 25 18:06:23.304757 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jun 25 18:06:23.314700 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jun 25 18:06:23.314767 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jun 25 18:06:23.316020 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.316175 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jun 25 18:06:23.324728 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jun 25 18:06:23.335184 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jun 25 18:06:23.345303 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jun 25 18:06:23.355357 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jun 25 18:06:23.364648 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jun 25 18:06:23.364739 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:23.364834 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jun 25 18:06:23.364901 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.365808 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jun 25 18:06:23.365904 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jun 25 18:06:23.387708 systemd[1]: modprobe@drm.service: Deactivated successfully. Jun 25 18:06:23.387771 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jun 25 18:06:23.393584 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jun 25 18:06:23.402801 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jun 25 18:06:23.402863 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jun 25 18:06:23.418526 systemd[1]: modprobe@loop.service: Deactivated successfully. Jun 25 18:06:23.418588 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jun 25 18:06:23.428871 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jun 25 18:06:23.428930 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jun 25 18:06:23.429468 systemd[1]: Finished ensure-sysext.service. Jun 25 18:06:23.487490 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Jun 25 18:06:23.519484 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Jun 25 18:06:23.519604 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Jun 25 18:06:23.540441 systemd-networkd[1141]: bond0: Link UP Jun 25 18:06:23.540896 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Jun 25 18:06:23.558580 systemd[1]: Reached target network.target - Network. Jun 25 18:06:23.561471 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Jun 25 18:06:23.577527 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Jun 25 18:06:23.580956 systemd-networkd[1141]: enp1s0f1np1: Link UP Jun 25 18:06:23.581183 systemd-networkd[1141]: enp1s0f1np1: Gained carrier Jun 25 18:06:23.581424 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Jun 25 18:06:23.581449 kernel: bond0: active interface up! Jun 25 18:06:23.582670 systemd-networkd[1141]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-b8:59:9f:e1:64:0e.network. Jun 25 18:06:23.611648 systemd[1]: Reached target sysinit.target - System Initialization. Jun 25 18:06:23.621622 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jun 25 18:06:23.631546 systemd[1]: Started motdgen.path - Watch for update engine configuration changes. Jun 25 18:06:23.641518 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path - Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jun 25 18:06:23.651588 systemd[1]: Started logrotate.timer - Daily rotation of log files. Jun 25 18:06:23.661561 systemd[1]: Started mdadm.timer - Weekly check for MD array's redundancy information.. Jun 25 18:06:23.671523 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Jun 25 18:06:23.681513 systemd[1]: update-engine-stub.timer - Update Engine Stub Timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jun 25 18:06:23.681531 systemd[1]: Reached target paths.target - Path Units. Jun 25 18:06:23.698516 systemd[1]: Reached target timers.target - Timer Units. Jun 25 18:06:23.703495 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jun 25 18:06:23.720757 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Jun 25 18:06:23.724482 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jun 25 18:06:23.729614 systemd-networkd[1141]: enp1s0f0np0: Link UP Jun 25 18:06:23.729835 systemd-networkd[1141]: bond0: Gained carrier Jun 25 18:06:23.729956 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:23.729956 systemd-networkd[1141]: enp1s0f0np0: Gained carrier Jun 25 18:06:23.744251 systemd[1]: Starting docker.socket - Docker Socket for the API... Jun 25 18:06:23.746501 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jun 25 18:06:23.746529 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Jun 25 18:06:23.762600 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:23.762633 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:23.762833 systemd-networkd[1141]: enp1s0f1np1: Link DOWN Jun 25 18:06:23.762836 systemd-networkd[1141]: enp1s0f1np1: Lost carrier Jun 25 18:06:23.770603 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:23.770634 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:23.770842 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:23.772777 systemd[1]: Listening on sshd.socket - OpenSSH Server Socket. Jun 25 18:06:23.782589 systemd[1]: systemd-pcrphase-sysinit.service - TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:23.783029 systemd[1]: Listening on docker.socket - Docker Socket for the API. Jun 25 18:06:23.792577 systemd[1]: Reached target sockets.target - Socket Units. Jun 25 18:06:23.800509 systemd[1]: Reached target basic.target - Basic System. Jun 25 18:06:23.808622 systemd[1]: addon-config@oem.service - Configure Addon /oem was skipped because no trigger condition checks were met. Jun 25 18:06:23.808635 systemd[1]: addon-run@oem.service - Run Addon /oem was skipped because no trigger condition checks were met. Jun 25 18:06:23.817538 systemd[1]: Starting containerd.service - containerd container runtime... Jun 25 18:06:23.828319 systemd[1]: Starting coreos-metadata.service - Flatcar Metadata Agent... Jun 25 18:06:23.838505 systemd[1]: Starting dbus.service - D-Bus System Message Bus... Jun 25 18:06:23.848214 systemd[1]: Starting enable-oem-cloudinit.service - Enable cloudinit... Jun 25 18:06:23.850162 dbus-daemon[1349]: [system] SELinux support is enabled Jun 25 18:06:23.850680 jq[1352]: false Jun 25 18:06:23.858186 systemd[1]: Starting extend-filesystems.service - Extend Filesystems... Jun 25 18:06:23.865534 extend-filesystems[1353]: Found loop3 Jun 25 18:06:23.912291 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Jun 25 18:06:23.912309 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 33 scanned by (udev-worker) (1154) Jun 25 18:06:23.912321 extend-filesystems[1353]: Found loop4 Jun 25 18:06:23.912321 extend-filesystems[1353]: Found loop5 Jun 25 18:06:23.912321 extend-filesystems[1353]: Found sda Jun 25 18:06:23.912321 extend-filesystems[1353]: Found sdb Jun 25 18:06:23.912321 extend-filesystems[1353]: Found sdb1 Jun 25 18:06:23.912321 extend-filesystems[1353]: Found sdb2 Jun 25 18:06:23.912321 extend-filesystems[1353]: Found sdb3 Jun 25 18:06:23.912321 extend-filesystems[1353]: Found usr Jun 25 18:06:23.912321 extend-filesystems[1353]: Found sdb4 Jun 25 18:06:23.912321 extend-filesystems[1353]: Found sdb6 Jun 25 18:06:23.912321 extend-filesystems[1353]: Found sdb7 Jun 25 18:06:23.912321 extend-filesystems[1353]: Found sdb9 Jun 25 18:06:23.912321 extend-filesystems[1353]: Checking size of /dev/sdb9 Jun 25 18:06:23.912321 extend-filesystems[1353]: Resized partition /dev/sdb9 Jun 25 18:06:24.117455 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jun 25 18:06:24.117643 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Jun 25 18:06:24.117656 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Jun 25 18:06:24.117667 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Jun 25 18:06:24.117677 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Jun 25 18:06:23.867469 systemd[1]: flatcar-setup-environment.service - Modifies /etc/environment for CoreOS was skipped because of an unmet condition check (ConditionPathExists=/oem/bin/flatcar-setup-environment). Jun 25 18:06:24.117741 coreos-metadata[1348]: Jun 25 18:06:23.870 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jun 25 18:06:24.117861 extend-filesystems[1361]: resize2fs 1.47.0 (5-Feb-2023) Jun 25 18:06:23.868204 systemd[1]: Starting motdgen.service - Generate /run/flatcar/motd... Jun 25 18:06:23.935550 systemd[1]: Starting ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline... Jun 25 18:06:23.961404 systemd[1]: Starting sshd-keygen.service - Generate sshd host keys... Jun 25 18:06:23.984343 systemd-networkd[1141]: enp1s0f1np1: Link UP Jun 25 18:06:23.984347 systemd-networkd[1141]: enp1s0f1np1: Gained carrier Jun 25 18:06:24.134783 update_engine[1378]: I0625 18:06:24.077864 1378 main.cc:92] Flatcar Update Engine starting Jun 25 18:06:24.134783 update_engine[1378]: I0625 18:06:24.078531 1378 update_check_scheduler.cc:74] Next update check in 10m2s Jun 25 18:06:24.003137 systemd[1]: Starting systemd-logind.service - User Login Management... Jun 25 18:06:24.139608 jq[1379]: true Jun 25 18:06:24.040646 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:24.040711 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:24.040773 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:24.040907 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:24.042477 systemd[1]: systemd-pcrphase.service - TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:24.043214 systemd[1]: Starting tcsd.service - TCG Core Services Daemon... Jun 25 18:06:24.059639 systemd-logind[1376]: Watching system buttons on /dev/input/event3 (Power Button) Jun 25 18:06:24.059650 systemd-logind[1376]: Watching system buttons on /dev/input/event2 (Sleep Button) Jun 25 18:06:24.059660 systemd-logind[1376]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Jun 25 18:06:24.059942 systemd-logind[1376]: New seat seat0. Jun 25 18:06:24.061784 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jun 25 18:06:24.071555 systemd[1]: Starting update-engine.service - Update Engine... Jun 25 18:06:24.088269 systemd[1]: Starting update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition... Jun 25 18:06:24.109779 systemd[1]: Started dbus.service - D-Bus System Message Bus. Jun 25 18:06:24.139778 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jun 25 18:06:24.139869 systemd[1]: Condition check resulted in enable-oem-cloudinit.service - Enable cloudinit being skipped. Jun 25 18:06:24.140052 systemd[1]: motdgen.service: Deactivated successfully. Jun 25 18:06:24.140132 systemd[1]: Finished motdgen.service - Generate /run/flatcar/motd. Jun 25 18:06:24.149649 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jun 25 18:06:24.149734 systemd[1]: Finished ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline. Jun 25 18:06:24.169372 jq[1381]: false Jun 25 18:06:24.170199 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Jun 25 18:06:24.170286 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition being skipped. Jun 25 18:06:24.170818 dbus-daemon[1349]: [system] Successfully activated service 'org.freedesktop.systemd1' Jun 25 18:06:24.174298 systemd[1]: Started systemd-logind.service - User Login Management. Jun 25 18:06:24.183667 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Jun 25 18:06:24.183756 systemd[1]: Condition check resulted in tcsd.service - TCG Core Services Daemon being skipped. Jun 25 18:06:24.185621 systemd[1]: Started update-engine.service - Update Engine. Jun 25 18:06:24.209754 systemd[1]: Starting sshkeys.service... Jun 25 18:06:24.216528 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service - Load cloud-config from /usr/share/oem/cloud-config.yml was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jun 25 18:06:24.216645 systemd[1]: Reached target system-config.target - Load system-provided cloud configs. Jun 25 18:06:24.226542 systemd[1]: user-cloudinit-proc-cmdline.service - Load cloud-config from url defined in /proc/cmdline was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jun 25 18:06:24.226664 systemd[1]: Reached target user-config.target - Load user-provided cloud configs. Jun 25 18:06:24.247693 systemd[1]: Started locksmithd.service - Cluster reboot manager. Jun 25 18:06:24.261748 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice - Slice /system/coreos-metadata-sshkeys. Jun 25 18:06:24.274952 locksmithd[1392]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jun 25 18:06:24.280732 systemd[1]: Starting coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys)... Jun 25 18:06:24.307000 containerd[1382]: time="2024-06-25T18:06:24.306948098Z" level=info msg="starting containerd" revision=99b8088b873ba42b788f29ccd0dc26ebb6952f1e version=v1.7.13 Jun 25 18:06:24.311649 coreos-metadata[1396]: Jun 25 18:06:24.311 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jun 25 18:06:24.320930 containerd[1382]: time="2024-06-25T18:06:24.320914095Z" level=info msg="loading plugin \"io.containerd.warning.v1.deprecations\"..." type=io.containerd.warning.v1 Jun 25 18:06:24.320962 containerd[1382]: time="2024-06-25T18:06:24.320932288Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.321674 containerd[1382]: time="2024-06-25T18:06:24.321656728Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/6.1.95-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jun 25 18:06:24.321714 containerd[1382]: time="2024-06-25T18:06:24.321673309Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.321804 containerd[1382]: time="2024-06-25T18:06:24.321793211Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jun 25 18:06:24.321804 containerd[1382]: time="2024-06-25T18:06:24.321804015Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jun 25 18:06:24.321857 containerd[1382]: time="2024-06-25T18:06:24.321849390Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.321887 containerd[1382]: time="2024-06-25T18:06:24.321878813Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." error="no scratch file generator: skip plugin" type=io.containerd.snapshotter.v1 Jun 25 18:06:24.321887 containerd[1382]: time="2024-06-25T18:06:24.321887014Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.321937 containerd[1382]: time="2024-06-25T18:06:24.321921231Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.322039 containerd[1382]: time="2024-06-25T18:06:24.322030394Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.322070 containerd[1382]: time="2024-06-25T18:06:24.322040839Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jun 25 18:06:24.322070 containerd[1382]: time="2024-06-25T18:06:24.322046460Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.322120 containerd[1382]: time="2024-06-25T18:06:24.322112270Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jun 25 18:06:24.322146 containerd[1382]: time="2024-06-25T18:06:24.322123186Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jun 25 18:06:24.322172 containerd[1382]: time="2024-06-25T18:06:24.322151040Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jun 25 18:06:24.322172 containerd[1382]: time="2024-06-25T18:06:24.322157904Z" level=info msg="metadata content store policy set" policy=shared Jun 25 18:06:24.339025 containerd[1382]: time="2024-06-25T18:06:24.339011603Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jun 25 18:06:24.339054 containerd[1382]: time="2024-06-25T18:06:24.339026746Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jun 25 18:06:24.339054 containerd[1382]: time="2024-06-25T18:06:24.339034937Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jun 25 18:06:24.339054 containerd[1382]: time="2024-06-25T18:06:24.339050001Z" level=info msg="loading plugin \"io.containerd.lease.v1.manager\"..." type=io.containerd.lease.v1 Jun 25 18:06:24.339126 containerd[1382]: time="2024-06-25T18:06:24.339058456Z" level=info msg="loading plugin \"io.containerd.nri.v1.nri\"..." type=io.containerd.nri.v1 Jun 25 18:06:24.339126 containerd[1382]: time="2024-06-25T18:06:24.339064950Z" level=info msg="NRI interface is disabled by configuration." Jun 25 18:06:24.339126 containerd[1382]: time="2024-06-25T18:06:24.339071361Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jun 25 18:06:24.339189 containerd[1382]: time="2024-06-25T18:06:24.339133541Z" level=info msg="loading plugin \"io.containerd.runtime.v2.shim\"..." type=io.containerd.runtime.v2 Jun 25 18:06:24.339189 containerd[1382]: time="2024-06-25T18:06:24.339143371Z" level=info msg="loading plugin \"io.containerd.sandbox.store.v1.local\"..." type=io.containerd.sandbox.store.v1 Jun 25 18:06:24.339189 containerd[1382]: time="2024-06-25T18:06:24.339150749Z" level=info msg="loading plugin \"io.containerd.sandbox.controller.v1.local\"..." type=io.containerd.sandbox.controller.v1 Jun 25 18:06:24.339189 containerd[1382]: time="2024-06-25T18:06:24.339158053Z" level=info msg="loading plugin \"io.containerd.streaming.v1.manager\"..." type=io.containerd.streaming.v1 Jun 25 18:06:24.339189 containerd[1382]: time="2024-06-25T18:06:24.339165831Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.339189 containerd[1382]: time="2024-06-25T18:06:24.339174888Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.339189 containerd[1382]: time="2024-06-25T18:06:24.339182287Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.339189 containerd[1382]: time="2024-06-25T18:06:24.339189423Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.339334 containerd[1382]: time="2024-06-25T18:06:24.339197182Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.339334 containerd[1382]: time="2024-06-25T18:06:24.339204811Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.339334 containerd[1382]: time="2024-06-25T18:06:24.339211989Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.339334 containerd[1382]: time="2024-06-25T18:06:24.339218650Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jun 25 18:06:24.339334 containerd[1382]: time="2024-06-25T18:06:24.339268491Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jun 25 18:06:24.339422 containerd[1382]: time="2024-06-25T18:06:24.339395084Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.339422 containerd[1382]: time="2024-06-25T18:06:24.339409769Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339467 containerd[1382]: time="2024-06-25T18:06:24.339417403Z" level=info msg="loading plugin \"io.containerd.transfer.v1.local\"..." type=io.containerd.transfer.v1 Jun 25 18:06:24.339467 containerd[1382]: time="2024-06-25T18:06:24.339436715Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jun 25 18:06:24.339509 containerd[1382]: time="2024-06-25T18:06:24.339470457Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339509 containerd[1382]: time="2024-06-25T18:06:24.339478543Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339509 containerd[1382]: time="2024-06-25T18:06:24.339485734Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339509 containerd[1382]: time="2024-06-25T18:06:24.339492434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339509 containerd[1382]: time="2024-06-25T18:06:24.339499379Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339509 containerd[1382]: time="2024-06-25T18:06:24.339506266Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339609 containerd[1382]: time="2024-06-25T18:06:24.339512564Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339609 containerd[1382]: time="2024-06-25T18:06:24.339518639Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339609 containerd[1382]: time="2024-06-25T18:06:24.339525971Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jun 25 18:06:24.339609 containerd[1382]: time="2024-06-25T18:06:24.339594644Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandbox-controllers\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339609 containerd[1382]: time="2024-06-25T18:06:24.339604766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandboxes\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339705 containerd[1382]: time="2024-06-25T18:06:24.339611700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339705 containerd[1382]: time="2024-06-25T18:06:24.339618281Z" level=info msg="loading plugin \"io.containerd.grpc.v1.streaming\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339705 containerd[1382]: time="2024-06-25T18:06:24.339624602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339705 containerd[1382]: time="2024-06-25T18:06:24.339633570Z" level=info msg="loading plugin \"io.containerd.grpc.v1.transfer\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339705 containerd[1382]: time="2024-06-25T18:06:24.339640155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339705 containerd[1382]: time="2024-06-25T18:06:24.339646077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.339820 containerd[1382]: time="2024-06-25T18:06:24.339790137Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.8 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jun 25 18:06:24.339820 containerd[1382]: time="2024-06-25T18:06:24.339822092Z" level=info msg="Connect containerd service" Jun 25 18:06:24.339951 containerd[1382]: time="2024-06-25T18:06:24.339835563Z" level=info msg="using legacy CRI server" Jun 25 18:06:24.339951 containerd[1382]: time="2024-06-25T18:06:24.339839658Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this" Jun 25 18:06:24.339951 containerd[1382]: time="2024-06-25T18:06:24.339852706Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jun 25 18:06:24.340146 containerd[1382]: time="2024-06-25T18:06:24.340134909Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jun 25 18:06:24.340171 containerd[1382]: time="2024-06-25T18:06:24.340155613Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jun 25 18:06:24.340171 containerd[1382]: time="2024-06-25T18:06:24.340165648Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jun 25 18:06:24.340215 containerd[1382]: time="2024-06-25T18:06:24.340172066Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jun 25 18:06:24.340215 containerd[1382]: time="2024-06-25T18:06:24.340177979Z" level=info msg="skipping tracing processor initialization (no tracing plugin)" error="no OpenTelemetry endpoint: skip plugin" Jun 25 18:06:24.340279 containerd[1382]: time="2024-06-25T18:06:24.340255203Z" level=info msg="Start subscribing containerd event" Jun 25 18:06:24.340307 containerd[1382]: time="2024-06-25T18:06:24.340289411Z" level=info msg="Start recovering state" Jun 25 18:06:24.340345 containerd[1382]: time="2024-06-25T18:06:24.340338619Z" level=info msg="Start event monitor" Jun 25 18:06:24.340366 containerd[1382]: time="2024-06-25T18:06:24.340343036Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jun 25 18:06:24.340366 containerd[1382]: time="2024-06-25T18:06:24.340350110Z" level=info msg="Start snapshots syncer" Jun 25 18:06:24.340366 containerd[1382]: time="2024-06-25T18:06:24.340359620Z" level=info msg="Start cni network conf syncer for default" Jun 25 18:06:24.340366 containerd[1382]: time="2024-06-25T18:06:24.340365235Z" level=info msg="Start streaming server" Jun 25 18:06:24.340541 containerd[1382]: time="2024-06-25T18:06:24.340375197Z" level=info msg=serving... address=/run/containerd/containerd.sock Jun 25 18:06:24.340592 containerd[1382]: time="2024-06-25T18:06:24.340580029Z" level=info msg="containerd successfully booted in 0.034098s" Jun 25 18:06:24.340650 systemd[1]: Started containerd.service - containerd container runtime. Jun 25 18:06:24.474423 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Jun 25 18:06:24.499506 extend-filesystems[1361]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Jun 25 18:06:24.499506 extend-filesystems[1361]: old_desc_blocks = 1, new_desc_blocks = 56 Jun 25 18:06:24.499506 extend-filesystems[1361]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Jun 25 18:06:24.541467 extend-filesystems[1353]: Resized filesystem in /dev/sdb9 Jun 25 18:06:24.499958 systemd[1]: extend-filesystems.service: Deactivated successfully. Jun 25 18:06:24.500056 systemd[1]: Finished extend-filesystems.service - Extend Filesystems. Jun 25 18:06:24.574838 sshd_keygen[1375]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jun 25 18:06:24.587313 systemd[1]: Finished sshd-keygen.service - Generate sshd host keys. Jun 25 18:06:24.603717 systemd[1]: Starting issuegen.service - Generate /run/issue... Jun 25 18:06:24.611773 systemd[1]: issuegen.service: Deactivated successfully. Jun 25 18:06:24.611848 systemd[1]: Finished issuegen.service - Generate /run/issue. Jun 25 18:06:24.631735 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Jun 25 18:06:24.641754 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Jun 25 18:06:24.659697 systemd[1]: Started getty@tty1.service - Getty on tty1. Jun 25 18:06:24.669332 systemd[1]: Started serial-getty@ttyS1.service - Serial Getty on ttyS1. Jun 25 18:06:24.678597 systemd[1]: Reached target getty.target - Login Prompts. Jun 25 18:06:25.042920 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:25.426547 systemd-networkd[1141]: bond0: Gained IPv6LL Jun 25 18:06:25.426763 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:25.427676 systemd[1]: Finished systemd-networkd-wait-online.service - Wait for Network to be Configured. Jun 25 18:06:25.437750 systemd[1]: Reached target network-online.target - Network is Online. Jun 25 18:06:25.457638 systemd[1]: Starting nvidia.service - NVIDIA Configure Service... Jun 25 18:06:25.466302 systemd[1]: Finished nvidia.service - NVIDIA Configure Service. Jun 25 18:06:27.314260 kernel: mlx5_core 0000:01:00.0: lag map: port 1:1 port 2:2 Jun 25 18:06:27.314387 kernel: mlx5_core 0000:01:00.0: shared_fdb:0 mode:queue_affinity Jun 25 18:06:29.685506 login[1429]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jun 25 18:06:29.716007 login[1428]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jun 25 18:06:29.716337 systemd-logind[1376]: New session 1 of user core. Jun 25 18:06:29.717247 systemd[1]: Created slice user-500.slice - User Slice of UID 500. Jun 25 18:06:29.734806 systemd[1]: Starting user-runtime-dir@500.service - User Runtime Directory /run/user/500... Jun 25 18:06:29.736332 systemd-logind[1376]: New session 2 of user core. Jun 25 18:06:29.741204 systemd[1]: Finished user-runtime-dir@500.service - User Runtime Directory /run/user/500. Jun 25 18:06:29.742185 systemd[1]: Starting user@500.service - User Manager for UID 500... Jun 25 18:06:29.745022 (systemd)[1442]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:29.811815 systemd[1442]: Queued start job for default target default.target. Jun 25 18:06:29.822759 systemd[1442]: Reached target paths.target - Paths. Jun 25 18:06:29.822770 systemd[1442]: Reached target sockets.target - Sockets. Jun 25 18:06:29.822778 systemd[1442]: Reached target timers.target - Timers. Jun 25 18:06:29.822785 systemd[1442]: Reached target basic.target - Basic System. Jun 25 18:06:29.822805 systemd[1442]: Reached target default.target - Main User Target. Jun 25 18:06:29.822820 systemd[1442]: Startup finished in 74ms. Jun 25 18:06:29.822873 systemd[1]: Started user@500.service - User Manager for UID 500. Jun 25 18:06:29.823687 systemd[1]: Started session-1.scope - Session 1 of User core. Jun 25 18:06:29.824114 systemd[1]: Started session-2.scope - Session 2 of User core. Jun 25 18:06:30.035750 coreos-metadata[1348]: Jun 25 18:06:30.035 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jun 25 18:06:30.036530 coreos-metadata[1396]: Jun 25 18:06:30.035 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jun 25 18:06:31.036251 coreos-metadata[1396]: Jun 25 18:06:31.036 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jun 25 18:06:31.036547 coreos-metadata[1348]: Jun 25 18:06:31.036 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jun 25 18:06:31.543289 kernel: mlx5_core 0000:01:00.0: lag map: port 1:2 port 2:2 Jun 25 18:06:31.543456 kernel: mlx5_core 0000:01:00.0: lag map: port 1:1 port 2:2 Jun 25 18:06:32.111376 coreos-metadata[1396]: Jun 25 18:06:32.111 INFO Fetch successful Jun 25 18:06:32.112561 coreos-metadata[1348]: Jun 25 18:06:32.112 INFO Fetch successful Jun 25 18:06:32.137240 unknown[1396]: wrote ssh authorized keys file for user: core Jun 25 18:06:32.154761 systemd[1]: Finished coreos-metadata.service - Flatcar Metadata Agent. Jun 25 18:06:32.156128 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Jun 25 18:06:32.156987 systemd[1]: Starting packet-phone-home.service - Report Success to Packet... Jun 25 18:06:32.185200 update-ssh-keys[1463]: Updated "/home/core/.ssh/authorized_keys" Jun 25 18:06:32.186553 systemd[1]: Finished coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys). Jun 25 18:06:32.190339 systemd[1]: Finished sshkeys.service. Jun 25 18:06:32.297813 systemd[1]: Starting docker.service - Docker Application Container Engine... Jun 25 18:06:32.359869 systemd[1]: Finished packet-phone-home.service - Report Success to Packet. Jun 25 18:06:32.588247 dockerd[1478]: time="2024-06-25T18:06:32.588184847Z" level=info msg="Starting up" Jun 25 18:06:32.610989 dockerd[1478]: time="2024-06-25T18:06:32.610937046Z" level=info msg="Loading containers: start." Jun 25 18:06:32.673431 kernel: Initializing XFRM netlink socket Jun 25 18:06:32.695191 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:32.695260 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:32.699439 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:32.699585 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:32.744870 systemd-networkd[1141]: docker0: Link UP Jun 25 18:06:32.745299 systemd-timesyncd[1330]: Network configuration changed, trying to establish connection. Jun 25 18:06:32.762267 dockerd[1478]: time="2024-06-25T18:06:32.762159183Z" level=info msg="Loading containers: done." Jun 25 18:06:32.895086 dockerd[1478]: time="2024-06-25T18:06:32.894994871Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jun 25 18:06:32.895204 dockerd[1478]: time="2024-06-25T18:06:32.895166333Z" level=info msg="Docker daemon" commit=fca702de7f71362c8d103073c7e4a1d0a467fadd graphdriver=overlay2 version=24.0.9 Jun 25 18:06:32.895266 dockerd[1478]: time="2024-06-25T18:06:32.895252814Z" level=info msg="Daemon has completed initialization" Jun 25 18:06:32.896235 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3437216250-merged.mount: Deactivated successfully. Jun 25 18:06:32.915180 dockerd[1478]: time="2024-06-25T18:06:32.915113724Z" level=info msg="API listen on /run/docker.sock" Jun 25 18:06:32.915225 systemd[1]: Started docker.service - Docker Application Container Engine. Jun 25 18:06:32.915893 etcd-wrapper[1470]: Error response from daemon: No such container: etcd-member Jun 25 18:06:32.927847 etcd-wrapper[1609]: Error response from daemon: No such container: etcd-member Jun 25 18:06:32.952294 etcd-wrapper[1629]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Jun 25 18:06:33.457926 systemd[1]: Created slice system-sshd.slice - Slice /system/sshd. Jun 25 18:06:33.458703 systemd[1]: Started sshd@0-136.144.54.109:22-139.178.68.195:50466.service - OpenSSH per-connection server daemon (139.178.68.195:50466). Jun 25 18:06:33.491128 sshd[1639]: Accepted publickey for core from 139.178.68.195 port 50466 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:33.491916 sshd[1639]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:33.494782 systemd-logind[1376]: New session 3 of user core. Jun 25 18:06:33.503658 systemd[1]: Started session-3.scope - Session 3 of User core. Jun 25 18:06:33.564568 systemd[1]: Started sshd@1-136.144.54.109:22-139.178.68.195:50478.service - OpenSSH per-connection server daemon (139.178.68.195:50478). Jun 25 18:06:33.593733 sshd[1644]: Accepted publickey for core from 139.178.68.195 port 50478 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:33.594379 sshd[1644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:33.596863 systemd-logind[1376]: New session 4 of user core. Jun 25 18:06:33.605697 systemd[1]: Started session-4.scope - Session 4 of User core. Jun 25 18:06:33.660962 sshd[1644]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:33.674345 systemd[1]: sshd@1-136.144.54.109:22-139.178.68.195:50478.service: Deactivated successfully. Jun 25 18:06:33.675618 systemd[1]: session-4.scope: Deactivated successfully. Jun 25 18:06:33.675983 systemd-logind[1376]: Session 4 logged out. Waiting for processes to exit. Jun 25 18:06:33.676605 systemd[1]: Started sshd@2-136.144.54.109:22-139.178.68.195:50480.service - OpenSSH per-connection server daemon (139.178.68.195:50480). Jun 25 18:06:33.677176 systemd-logind[1376]: Removed session 4. Jun 25 18:06:33.705712 sshd[1650]: Accepted publickey for core from 139.178.68.195 port 50480 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:33.706402 sshd[1650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:33.709048 systemd-logind[1376]: New session 5 of user core. Jun 25 18:06:33.721658 systemd[1]: Started session-5.scope - Session 5 of User core. Jun 25 18:06:33.776649 sshd[1650]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:33.778035 systemd[1]: sshd@2-136.144.54.109:22-139.178.68.195:50480.service: Deactivated successfully. Jun 25 18:06:33.778414 systemd[1]: session-5.scope: Deactivated successfully. Jun 25 18:06:33.778825 systemd-logind[1376]: Session 5 logged out. Waiting for processes to exit. Jun 25 18:06:33.779360 systemd-logind[1376]: Removed session 5. Jun 25 18:06:34.179373 etcd-wrapper[1629]: v3.5.0: Pulling from coreos/etcd Jun 25 18:06:34.497292 etcd-wrapper[1629]: 1813d21adc01: Pulling fs layer Jun 25 18:06:34.497292 etcd-wrapper[1629]: 6e96907ab677: Pulling fs layer Jun 25 18:06:34.497866 etcd-wrapper[1629]: 444ed0ea8673: Pulling fs layer Jun 25 18:06:34.497866 etcd-wrapper[1629]: 0fd2df5633f0: Pulling fs layer Jun 25 18:06:34.497866 etcd-wrapper[1629]: 8cc22b9456bb: Pulling fs layer Jun 25 18:06:34.497866 etcd-wrapper[1629]: 7ac70aecd290: Pulling fs layer Jun 25 18:06:34.497866 etcd-wrapper[1629]: 4b376c64dfe4: Pulling fs layer Jun 25 18:06:34.497866 etcd-wrapper[1629]: 7ac70aecd290: Waiting Jun 25 18:06:34.497866 etcd-wrapper[1629]: 4b376c64dfe4: Waiting Jun 25 18:06:34.497866 etcd-wrapper[1629]: 0fd2df5633f0: Waiting Jun 25 18:06:34.861156 etcd-wrapper[1629]: 444ed0ea8673: Verifying Checksum Jun 25 18:06:34.861156 etcd-wrapper[1629]: 444ed0ea8673: Download complete Jun 25 18:06:34.864412 etcd-wrapper[1629]: 6e96907ab677: Verifying Checksum Jun 25 18:06:34.864412 etcd-wrapper[1629]: 6e96907ab677: Download complete Jun 25 18:06:35.050803 etcd-wrapper[1629]: 1813d21adc01: Verifying Checksum Jun 25 18:06:35.050803 etcd-wrapper[1629]: 1813d21adc01: Download complete Jun 25 18:06:35.193996 etcd-wrapper[1629]: 8cc22b9456bb: Verifying Checksum Jun 25 18:06:35.194259 etcd-wrapper[1629]: 8cc22b9456bb: Download complete Jun 25 18:06:35.205436 etcd-wrapper[1629]: 0fd2df5633f0: Verifying Checksum Jun 25 18:06:35.205436 etcd-wrapper[1629]: 0fd2df5633f0: Download complete Jun 25 18:06:35.391675 etcd-wrapper[1629]: 7ac70aecd290: Verifying Checksum Jun 25 18:06:35.391675 etcd-wrapper[1629]: 7ac70aecd290: Download complete Jun 25 18:06:35.432642 etcd-wrapper[1629]: 1813d21adc01: Pull complete Jun 25 18:06:35.498366 etcd-wrapper[1629]: 4b376c64dfe4: Verifying Checksum Jun 25 18:06:35.498366 etcd-wrapper[1629]: 4b376c64dfe4: Download complete Jun 25 18:06:35.515409 systemd[1]: var-lib-docker-overlay2-5fb3a437c243ab7d7dc93d1313e23e9f2560b745cb4d308f4c273d92daecda6e-merged.mount: Deactivated successfully. Jun 25 18:06:35.757626 etcd-wrapper[1629]: 6e96907ab677: Pull complete Jun 25 18:06:35.833071 systemd[1]: var-lib-docker-overlay2-555e07edbdb13919f956ffb0e3721276376f2ab7b9b270763dc589ba7775ebb9-merged.mount: Deactivated successfully. Jun 25 18:06:35.882506 etcd-wrapper[1629]: 444ed0ea8673: Pull complete Jun 25 18:06:36.049524 etcd-wrapper[1629]: 0fd2df5633f0: Pull complete Jun 25 18:06:36.087884 etcd-wrapper[1629]: 8cc22b9456bb: Pull complete Jun 25 18:06:36.104908 etcd-wrapper[1629]: 7ac70aecd290: Pull complete Jun 25 18:06:36.120678 etcd-wrapper[1629]: 4b376c64dfe4: Pull complete Jun 25 18:06:36.129078 etcd-wrapper[1629]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Jun 25 18:06:36.131166 etcd-wrapper[1629]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Jun 25 18:06:36.421511 containerd[1382]: time="2024-06-25T18:06:36.421400225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jun 25 18:06:36.421511 containerd[1382]: time="2024-06-25T18:06:36.421447595Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:36.421511 containerd[1382]: time="2024-06-25T18:06:36.421461109Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jun 25 18:06:36.421511 containerd[1382]: time="2024-06-25T18:06:36.421470910Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:36.440766 systemd[1]: Started docker-b0ca0905113bbbe70004f46e2b372ac9c5597e8cbaad2893e1448c773758639c.scope - libcontainer container b0ca0905113bbbe70004f46e2b372ac9c5597e8cbaad2893e1448c773758639c. Jun 25 18:06:36.442527 systemd[1]: var-lib-docker-overlay2-0aae4649b5f762d0e2d366093c0578818248d1cf56ff5c0cf94910f8d62606a8-merged.mount: Deactivated successfully. Jun 25 18:06:36.472624 etcd-wrapper[1629]: {"level":"info","ts":1719338796.4723904,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jun 25 18:06:36.472624 etcd-wrapper[1629]: {"level":"info","ts":1719338796.4724388,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"271a7cb09e334196bf1f74872bef7598"} Jun 25 18:06:36.472624 etcd-wrapper[1629]: {"level":"warn","ts":1719338796.4724581,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jun 25 18:06:36.472624 etcd-wrapper[1629]: {"level":"warn","ts":1719338796.4724634,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Jun 25 18:06:36.472624 etcd-wrapper[1629]: {"level":"warn","ts":1719338796.4724672,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jun 25 18:06:36.472624 etcd-wrapper[1629]: {"level":"warn","ts":1719338796.4724708,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jun 25 18:06:36.472624 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:36.472Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.57:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.57:2380","--advertise-client-urls=http://10.67.80.57:2379","--discovery=https://discovery.etcd.io/02c051fae9adfb97b3a4f3a9c49f937b"]} Jun 25 18:06:36.473024 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:36.472Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.57:2380"]} Jun 25 18:06:36.473024 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:36.472Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Jun 25 18:06:36.473024 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:36.472Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"271a7cb09e334196bf1f74872bef7598","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.57:2380"],"listen-peer-urls":["http://10.67.80.57:2380"],"advertise-client-urls":["http://10.67.80.57:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"271a7cb09e334196bf1f74872bef7598=http://10.67.80.57:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/02c051fae9adfb97b3a4f3a9c49f937b","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/02c051fae9adfb97b3a4f3a9c49f937b","discovery-proxy":"","downgrade-check-interval":"5s"} Jun 25 18:06:36.473624 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:36.473Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"557.791µs"} Jun 25 18:06:37.003608 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:37.003Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"1190de3971a1bf91"} Jun 25 18:06:37.003608 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:37.003Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"f38cdb19466da8da"} Jun 25 18:06:37.003608 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:37.003Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Jun 25 18:06:43.804763 systemd[1]: Started sshd@3-136.144.54.109:22-139.178.68.195:42998.service - OpenSSH per-connection server daemon (139.178.68.195:42998). Jun 25 18:06:43.834129 sshd[1742]: Accepted publickey for core from 139.178.68.195 port 42998 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:43.834808 sshd[1742]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:43.837404 systemd-logind[1376]: New session 6 of user core. Jun 25 18:06:43.844665 systemd[1]: Started session-6.scope - Session 6 of User core. Jun 25 18:06:43.898561 sshd[1742]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:43.907983 systemd[1]: sshd@3-136.144.54.109:22-139.178.68.195:42998.service: Deactivated successfully. Jun 25 18:06:43.908346 systemd[1]: session-6.scope: Deactivated successfully. Jun 25 18:06:43.908737 systemd-logind[1376]: Session 6 logged out. Waiting for processes to exit. Jun 25 18:06:43.909500 systemd[1]: Started sshd@4-136.144.54.109:22-139.178.68.195:43010.service - OpenSSH per-connection server daemon (139.178.68.195:43010). Jun 25 18:06:43.910053 systemd-logind[1376]: Removed session 6. Jun 25 18:06:43.939170 sshd[1748]: Accepted publickey for core from 139.178.68.195 port 43010 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:43.939891 sshd[1748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:43.942589 systemd-logind[1376]: New session 7 of user core. Jun 25 18:06:43.953659 systemd[1]: Started session-7.scope - Session 7 of User core. Jun 25 18:06:44.016855 sshd[1748]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:44.023007 systemd[1]: sshd@4-136.144.54.109:22-139.178.68.195:43010.service: Deactivated successfully. Jun 25 18:06:44.024775 systemd[1]: session-7.scope: Deactivated successfully. Jun 25 18:06:44.026500 systemd-logind[1376]: Session 7 logged out. Waiting for processes to exit. Jun 25 18:06:44.028658 systemd-logind[1376]: Removed session 7. Jun 25 18:06:51.782460 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.781Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"3bd8077294aa7e3d"} Jun 25 18:06:51.782460 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.781Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Jun 25 18:06:51.787664 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.787Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"f38cdb19466da8da","cluster-id":"a83ca223ecfd5be9"} Jun 25 18:06:51.787664 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.787Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da switched to configuration voters=()"} Jun 25 18:06:51.787664 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.787Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da became follower at term 0"} Jun 25 18:06:51.787664 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.787Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft f38cdb19466da8da [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Jun 25 18:06:51.787664 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.787Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da became follower at term 1"} Jun 25 18:06:51.787664 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.787Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da switched to configuration voters=(1265755833592037265)"} Jun 25 18:06:51.787664 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.787Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da switched to configuration voters=(1265755833592037265 4312204831909117501)"} Jun 25 18:06:51.787664 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.787Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da switched to configuration voters=(1265755833592037265 4312204831909117501 17549642749558237402)"} Jun 25 18:06:51.788835 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:06:51.788Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Jun 25 18:06:51.790236 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.789Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Jun 25 18:06:51.790831 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.790Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jun 25 18:06:51.791404 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.791Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.791689 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.791Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.792745 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.792Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.793115 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.792Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.793431 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.793Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.793431 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.793Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.793431 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.793Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91","remote-peer-urls":["http://10.67.80.47:2380"]} Jun 25 18:06:51.793431 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.793Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.793431 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.793Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.793431 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.793Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.793769 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.793Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.793971 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.793Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.794159 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.794159 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.794159 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d","remote-peer-urls":["http://10.67.80.25:2380"]} Jun 25 18:06:51.794289 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.794289 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"f38cdb19466da8da","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Jun 25 18:06:51.794289 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Jun 25 18:06:51.794697 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.794697 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da switched to configuration voters=(1265755833592037265 4312204831909117501 17549642749558237402)"} Jun 25 18:06:51.794697 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.794811 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a83ca223ecfd5be9","local-member-id":"f38cdb19466da8da","added-peer-id":"1190de3971a1bf91","added-peer-peer-urls":["http://10.67.80.47:2380"]} Jun 25 18:06:51.794811 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.794811 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da switched to configuration voters=(1265755833592037265 4312204831909117501 17549642749558237402)"} Jun 25 18:06:51.794950 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a83ca223ecfd5be9","local-member-id":"f38cdb19466da8da","added-peer-id":"3bd8077294aa7e3d","added-peer-peer-urls":["http://10.67.80.25:2380"]} Jun 25 18:06:51.795034 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da switched to configuration voters=(1265755833592037265 4312204831909117501 17549642749558237402)"} Jun 25 18:06:51.795034 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.794Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a83ca223ecfd5be9","local-member-id":"f38cdb19466da8da","added-peer-id":"f38cdb19466da8da","added-peer-peer-urls":["http://10.67.80.57:2380"]} Jun 25 18:06:51.795881 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.795Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.57:2380"} Jun 25 18:06:51.795881 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.795Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"f38cdb19466da8da","initial-advertise-peer-urls":["http://10.67.80.57:2380"],"listen-peer-urls":["http://10.67.80.57:2380"],"advertise-client-urls":["http://10.67.80.57:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Jun 25 18:06:51.795881 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.795Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.57:2380"} Jun 25 18:06:51.796071 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.795Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"f38cdb19466da8da","to":"1190de3971a1bf91","stream-type":"stream Message"} Jun 25 18:06:51.796071 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.795Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.796071 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.795Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"f38cdb19466da8da","to":"1190de3971a1bf91","stream-type":"stream MsgApp v2"} Jun 25 18:06:51.796071 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.795Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"f38cdb19466da8da","remote-peer-id":"1190de3971a1bf91"} Jun 25 18:06:51.965622 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.965Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"f38cdb19466da8da","to":"3bd8077294aa7e3d","stream-type":"stream Message"} Jun 25 18:06:51.965622 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.965Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.965622 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.965Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.965622 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.965Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"f38cdb19466da8da","to":"3bd8077294aa7e3d","stream-type":"stream MsgApp v2"} Jun 25 18:06:51.965622 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.965Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.965622 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.965Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.965622 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.965Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:06:51.997113 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:51.996Z","caller":"etcdserver/server.go:767","msg":"initialized peer connections; fast-forwarding election ticks","local-member-id":"f38cdb19466da8da","forward-ticks":8,"forward-duration":"800ms","election-ticks":10,"election-timeout":"1s","active-remote-members":2} Jun 25 18:06:52.261459 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.261Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3bd8077294aa7e3d [logterm: 1, index: 3] at term 1"} Jun 25 18:06:52.265108 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.264Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da [term: 1] received a MsgVote message with higher term from 3bd8077294aa7e3d [term: 2]"} Jun 25 18:06:52.265108 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.264Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da became follower at term 2"} Jun 25 18:06:52.265108 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.264Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da [logterm: 1, index: 3, vote: 0] cast MsgVote for 3bd8077294aa7e3d [logterm: 1, index: 3] at term 2"} Jun 25 18:06:52.266259 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.265Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: f38cdb19466da8da elected leader 3bd8077294aa7e3d at term 2"} Jun 25 18:06:52.268647 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.268Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jun 25 18:06:52.268647 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.268Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"f38cdb19466da8da","local-member-attributes":"{Name:271a7cb09e334196bf1f74872bef7598 ClientURLs:[http://10.67.80.57:2379]}","request-path":"/0/members/f38cdb19466da8da/attributes","cluster-id":"a83ca223ecfd5be9","publish-timeout":"7s"} Jun 25 18:06:52.268979 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.268Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Jun 25 18:06:52.268979 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.268Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Jun 25 18:06:52.269054 systemd[1]: Started etcd-member.service - etcd (System Application Container). Jun 25 18:06:52.269945 systemd[1]: Reached target multi-user.target - Multi-User System. Jun 25 18:06:52.270313 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.270Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"a83ca223ecfd5be9","local-member-id":"f38cdb19466da8da","cluster-version":"3.5"} Jun 25 18:06:52.270313 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.270Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Jun 25 18:06:52.270684 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:52.270Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Jun 25 18:06:52.289397 systemd[1]: Starting systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP... Jun 25 18:06:52.296723 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jun 25 18:06:52.296816 systemd[1]: Finished systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP. Jun 25 18:06:52.297009 systemd[1]: Startup finished in 1.874s (kernel) + 7.728s (initrd) + 34.679s (userspace) = 44.282s. Jun 25 18:06:54.048871 systemd[1]: Started sshd@5-136.144.54.109:22-139.178.68.195:42552.service - OpenSSH per-connection server daemon (139.178.68.195:42552). Jun 25 18:06:54.078191 sshd[1759]: Accepted publickey for core from 139.178.68.195 port 42552 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:54.078912 sshd[1759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:54.081816 systemd-logind[1376]: New session 8 of user core. Jun 25 18:06:54.094619 systemd[1]: Started session-8.scope - Session 8 of User core. Jun 25 18:06:54.151355 sshd[1759]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:54.163011 systemd[1]: sshd@5-136.144.54.109:22-139.178.68.195:42552.service: Deactivated successfully. Jun 25 18:06:54.163371 systemd[1]: session-8.scope: Deactivated successfully. Jun 25 18:06:54.163798 systemd-logind[1376]: Session 8 logged out. Waiting for processes to exit. Jun 25 18:06:54.164613 systemd[1]: Started sshd@6-136.144.54.109:22-139.178.68.195:42562.service - OpenSSH per-connection server daemon (139.178.68.195:42562). Jun 25 18:06:54.165140 systemd-logind[1376]: Removed session 8. Jun 25 18:06:54.194551 sshd[1765]: Accepted publickey for core from 139.178.68.195 port 42562 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:54.195248 sshd[1765]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:54.197855 systemd-logind[1376]: New session 9 of user core. Jun 25 18:06:54.213749 systemd[1]: Started session-9.scope - Session 9 of User core. Jun 25 18:06:54.269846 sshd[1765]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:54.289589 systemd[1]: sshd@6-136.144.54.109:22-139.178.68.195:42562.service: Deactivated successfully. Jun 25 18:06:54.291180 systemd[1]: session-9.scope: Deactivated successfully. Jun 25 18:06:54.292791 systemd-logind[1376]: Session 9 logged out. Waiting for processes to exit. Jun 25 18:06:54.308573 systemd[1]: Started sshd@7-136.144.54.109:22-139.178.68.195:42566.service - OpenSSH per-connection server daemon (139.178.68.195:42566). Jun 25 18:06:54.311162 systemd-logind[1376]: Removed session 9. Jun 25 18:06:54.362835 sshd[1771]: Accepted publickey for core from 139.178.68.195 port 42566 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:54.363437 sshd[1771]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:54.365860 systemd-logind[1376]: New session 10 of user core. Jun 25 18:06:54.379677 systemd[1]: Started session-10.scope - Session 10 of User core. Jun 25 18:06:54.435536 sshd[1771]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:54.450941 systemd[1]: sshd@7-136.144.54.109:22-139.178.68.195:42566.service: Deactivated successfully. Jun 25 18:06:54.452647 systemd[1]: session-10.scope: Deactivated successfully. Jun 25 18:06:54.454470 systemd-logind[1376]: Session 10 logged out. Waiting for processes to exit. Jun 25 18:06:54.457669 systemd[1]: Started sshd@8-136.144.54.109:22-139.178.68.195:42572.service - OpenSSH per-connection server daemon (139.178.68.195:42572). Jun 25 18:06:54.460098 systemd-logind[1376]: Removed session 10. Jun 25 18:06:54.510205 sshd[1777]: Accepted publickey for core from 139.178.68.195 port 42572 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:54.510849 sshd[1777]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:54.513343 systemd-logind[1376]: New session 11 of user core. Jun 25 18:06:54.532759 systemd[1]: Started session-11.scope - Session 11 of User core. Jun 25 18:06:54.605193 sudo[1780]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jun 25 18:06:54.605917 sudo[1780]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jun 25 18:06:54.635449 sudo[1780]: pam_unix(sudo:session): session closed for user root Jun 25 18:06:54.638721 sshd[1777]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:54.665141 systemd[1]: sshd@8-136.144.54.109:22-139.178.68.195:42572.service: Deactivated successfully. Jun 25 18:06:54.666927 systemd[1]: session-11.scope: Deactivated successfully. Jun 25 18:06:54.668771 systemd-logind[1376]: Session 11 logged out. Waiting for processes to exit. Jun 25 18:06:54.672171 systemd[1]: Started sshd@9-136.144.54.109:22-139.178.68.195:42584.service - OpenSSH per-connection server daemon (139.178.68.195:42584). Jun 25 18:06:54.674760 systemd-logind[1376]: Removed session 11. Jun 25 18:06:54.774345 sshd[1784]: Accepted publickey for core from 139.178.68.195 port 42584 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:54.775885 sshd[1784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:54.780758 systemd-logind[1376]: New session 12 of user core. Jun 25 18:06:54.795657 systemd[1]: Started session-12.scope - Session 12 of User core. Jun 25 18:06:54.860928 sudo[1788]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jun 25 18:06:54.861112 sudo[1788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jun 25 18:06:54.863002 sudo[1788]: pam_unix(sudo:session): session closed for user root Jun 25 18:06:54.865623 sudo[1787]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jun 25 18:06:54.865761 sudo[1787]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jun 25 18:06:54.883812 systemd[1]: Stopping audit-rules.service - Load Security Auditing Rules... Jun 25 18:06:54.883000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jun 25 18:06:54.885002 auditctl[1791]: No rules Jun 25 18:06:54.885220 systemd[1]: audit-rules.service: Deactivated successfully. Jun 25 18:06:54.885347 systemd[1]: Stopped audit-rules.service - Load Security Auditing Rules. Jun 25 18:06:54.886545 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Jun 25 18:06:54.890053 kernel: kauditd_printk_skb: 70 callbacks suppressed Jun 25 18:06:54.890106 kernel: audit: type=1305 audit(1719338814.883:145): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jun 25 18:06:54.904322 augenrules[1808]: No rules Jun 25 18:06:54.904845 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Jun 25 18:06:54.883000 audit[1791]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf91bc200 a2=420 a3=0 items=0 ppid=1 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:54.905428 kernel: audit: type=1300 audit(1719338814.883:145): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf91bc200 a2=420 a3=0 items=0 ppid=1 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:54.905625 sudo[1787]: pam_unix(sudo:session): session closed for user root Jun 25 18:06:54.906765 sshd[1784]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:54.908744 systemd[1]: sshd@9-136.144.54.109:22-139.178.68.195:42584.service: Deactivated successfully. Jun 25 18:06:54.909333 systemd[1]: session-12.scope: Deactivated successfully. Jun 25 18:06:54.909920 systemd-logind[1376]: Session 12 logged out. Waiting for processes to exit. Jun 25 18:06:54.910696 systemd-logind[1376]: Removed session 12. Jun 25 18:06:54.883000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jun 25 18:06:54.945996 kernel: audit: type=1327 audit(1719338814.883:145): proctitle=2F7362696E2F617564697463746C002D44 Jun 25 18:06:54.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:54.967910 kernel: audit: type=1131 audit(1719338814.883:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:54.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:54.990354 kernel: audit: type=1130 audit(1719338814.903:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:54.903000 audit[1787]: USER_END pid=1787 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jun 25 18:06:55.016281 kernel: audit: type=1106 audit(1719338814.903:148): pid=1787 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jun 25 18:06:54.903000 audit[1787]: CRED_DISP pid=1787 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jun 25 18:06:55.039988 kernel: audit: type=1104 audit(1719338814.903:149): pid=1787 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jun 25 18:06:54.906000 audit[1784]: USER_END pid=1784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:06:55.071966 kernel: audit: type=1106 audit(1719338814.906:150): pid=1784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:06:54.906000 audit[1784]: CRED_DISP pid=1784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:06:55.073428 kernel: audit: type=1104 audit(1719338814.906:151): pid=1784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:06:54.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.109:22-139.178.68.195:42584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:55.123840 kernel: audit: type=1131 audit(1719338814.906:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.109:22-139.178.68.195:42584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:57.018287 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:57.017Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da [term: 2] received a MsgVote message with higher term from 1190de3971a1bf91 [term: 3]"} Jun 25 18:06:57.018287 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:57.017Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da became follower at term 3"} Jun 25 18:06:57.018287 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:57.017Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"f38cdb19466da8da [logterm: 2, index: 8, vote: 0] cast MsgVote for 1190de3971a1bf91 [logterm: 2, index: 8] at term 3"} Jun 25 18:06:57.018287 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:57.017Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: f38cdb19466da8da lost leader 3bd8077294aa7e3d at term 3"} Jun 25 18:06:57.020079 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:06:57.018Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: f38cdb19466da8da elected leader 1190de3971a1bf91 at term 3"} Jun 25 18:06:57.119722 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:06:57.118Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d","error":"EOF"} Jun 25 18:06:57.120061 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:06:57.119Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d","error":"EOF"} Jun 25 18:06:57.122628 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:06:57.122Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"3bd8077294aa7e3d","error":"failed to dial 3bd8077294aa7e3d on stream Message (peer 3bd8077294aa7e3d failed to find local node f38cdb19466da8da)"} Jun 25 18:07:03.569047 systemd-resolved[1329]: Clock change detected. Flushing caches. Jun 25 18:07:03.569383 systemd-timesyncd[1330]: Contacted time server [2600:3c01:e000:7e6::123]:123 (2.flatcar.pool.ntp.org). Jun 25 18:07:03.569499 systemd-timesyncd[1330]: Initial clock synchronization to Tue 2024-06-25 18:07:03.568906 UTC. Jun 25 18:07:03.897891 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:03.897Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:07:03.897891 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:03.897Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"f38cdb19466da8da","remote-peer-id":"3bd8077294aa7e3d"} Jun 25 18:07:09.465096 update_engine[1378]: I0625 18:07:09.464972 1378 update_attempter.cc:509] Updating boot flags... Jun 25 18:07:09.511315 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 33 scanned by (udev-worker) (1827) Jun 25 18:07:24.381837 systemd[1]: Started sshd@10-136.144.54.109:22-180.101.88.235:32432.service - OpenSSH per-connection server daemon (180.101.88.235:32432). Jun 25 18:07:24.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.109:22-180.101.88.235:32432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:07:24.424270 kernel: audit: type=1130 audit(1719338844.380:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.109:22-180.101.88.235:32432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:07:25.447679 sshd[1836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:07:25.446000 audit[1836]: USER_AUTH pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:07:25.524269 kernel: audit: type=1100 audit(1719338845.446:154): pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:07:27.231030 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:27.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:27.231030 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:27.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:27.708302 sshd[1834]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:07:27.989158 sshd[1837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:07:27.988000 audit[1837]: USER_AUTH pid=1837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:07:28.069335 kernel: audit: type=1100 audit(1719338847.988:155): pid=1837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:07:30.525159 sshd[1834]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:07:30.806100 sshd[1838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:07:30.805000 audit[1838]: USER_AUTH pid=1838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:07:30.889424 kernel: audit: type=1100 audit(1719338850.805:156): pid=1838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:07:32.231095 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:32.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:32.231095 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:32.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:33.086668 sshd[1834]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:07:33.226519 sshd[1834]: Received disconnect from 180.101.88.235 port 32432:11: [preauth] Jun 25 18:07:33.226519 sshd[1834]: Disconnected from authenticating user root 180.101.88.235 port 32432 [preauth] Jun 25 18:07:33.226000 audit[1834]: USER_ERR pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:07:33.229820 systemd[1]: sshd@10-136.144.54.109:22-180.101.88.235:32432.service: Deactivated successfully. Jun 25 18:07:33.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.109:22-180.101.88.235:32432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:07:33.336861 kernel: audit: type=1109 audit(1719338853.226:157): pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:07:33.336932 kernel: audit: type=1131 audit(1719338853.229:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.109:22-180.101.88.235:32432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:07:37.231346 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:37.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:37.231346 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:37.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:42.232081 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:42.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:42.232081 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:42.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:47.232864 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:47.232Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:47.232864 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:47.232Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:52.233923 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:52.233Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:52.233923 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:52.233Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:57.234870 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:57.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:07:57.234870 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:07:57.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:02.235327 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:02.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:02.235327 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:02.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:07.236052 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:07.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:07.236052 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:07.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:12.236523 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:12.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:12.236523 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:12.236Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:17.237682 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:17.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:17.237682 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:17.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:22.238641 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:22.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:22.238641 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:22.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:27.239515 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:27.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:27.239515 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:27.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:32.240497 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:32.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:32.240497 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:32.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:37.241317 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:37.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:37.241317 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:37.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:40.161700 systemd[1]: Started sshd@11-136.144.54.109:22-180.101.88.235:26850.service - OpenSSH per-connection server daemon (180.101.88.235:26850). Jun 25 18:08:40.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.109:22-180.101.88.235:26850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:40.253459 kernel: audit: type=1130 audit(1719338920.160:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.109:22-180.101.88.235:26850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:41.409573 sshd[1846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:08:41.408000 audit[1846]: USER_AUTH pid=1846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:08:41.502420 kernel: audit: type=1100 audit(1719338921.408:160): pid=1846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:08:42.242089 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:42.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:42.242089 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:42.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:43.102588 sshd[1844]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:08:43.429185 sshd[1847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:08:43.428000 audit[1847]: ANOM_LOGIN_FAILURES pid=1847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:43.429605 sshd[1847]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jun 25 18:08:43.428000 audit[1847]: USER_AUTH pid=1847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:08:43.518889 kernel: audit: type=2100 audit(1719338923.428:161): pid=1847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:43.518918 kernel: audit: type=1100 audit(1719338923.428:162): pid=1847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:08:45.398633 sshd[1844]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:08:45.717850 sshd[1848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:08:45.717000 audit[1848]: USER_AUTH pid=1848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:08:45.811438 kernel: audit: type=1100 audit(1719338925.717:163): pid=1848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:08:47.242257 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:47.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:47.242257 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:47.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:48.294462 sshd[1844]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:08:48.455526 sshd[1844]: Received disconnect from 180.101.88.235 port 26850:11: [preauth] Jun 25 18:08:48.455526 sshd[1844]: Disconnected from authenticating user root 180.101.88.235 port 26850 [preauth] Jun 25 18:08:48.455000 audit[1844]: USER_ERR pid=1844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:08:48.458861 systemd[1]: sshd@11-136.144.54.109:22-180.101.88.235:26850.service: Deactivated successfully. Jun 25 18:08:48.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.109:22-180.101.88.235:26850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:48.572624 kernel: audit: type=1109 audit(1719338928.455:164): pid=1844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:08:48.572657 kernel: audit: type=1131 audit(1719338928.458:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.109:22-180.101.88.235:26850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:52.242692 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:52.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:52.242692 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:52.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:57.243436 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:57.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:08:57.243436 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:08:57.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:02.244013 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:02.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:02.244013 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:02.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:07.244177 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:07.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:07.244177 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:07.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:12.244922 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:12.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:12.244922 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:12.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:17.245299 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:17.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:17.245299 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:17.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:22.245906 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:22.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:22.245906 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:22.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:27.246334 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:27.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:27.246334 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:27.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:32.247477 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:32.246Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:32.247477 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:32.246Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:37.248551 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:37.247Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:37.248551 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:37.247Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:42.249457 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:42.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:42.249457 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:42.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:47.249787 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:47.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:47.249787 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:47.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:52.249963 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:52.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:52.249963 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:52.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:54.499892 systemd[1]: Started sshd@12-136.144.54.109:22-180.101.88.235:16750.service - OpenSSH per-connection server daemon (180.101.88.235:16750). Jun 25 18:09:54.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.109:22-180.101.88.235:16750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:09:54.594448 kernel: audit: type=1130 audit(1719338994.499:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.109:22-180.101.88.235:16750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:09:55.543224 sshd[1854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:09:55.543000 audit[1854]: USER_AUTH pid=1854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:09:55.635432 kernel: audit: type=1100 audit(1719338995.543:167): pid=1854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:09:57.251184 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:57.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:57.251184 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:09:57.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:09:57.728508 sshd[1852]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:09:58.003158 sshd[1855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:09:58.003000 audit[1855]: ANOM_LOGIN_FAILURES pid=1855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:09:58.003617 sshd[1855]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jun 25 18:09:58.003000 audit[1855]: USER_AUTH pid=1855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:09:58.093523 kernel: audit: type=2100 audit(1719338998.003:168): pid=1855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:09:58.093556 kernel: audit: type=1100 audit(1719338998.003:169): pid=1855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:10:00.464321 sshd[1852]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:10:00.739156 sshd[1856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:10:00.739000 audit[1856]: USER_AUTH pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:10:00.833440 kernel: audit: type=1100 audit(1719339000.739:170): pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:10:02.251485 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:02.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:02.251485 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:02.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:02.612789 sshd[1852]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:10:02.748886 sshd[1852]: Received disconnect from 180.101.88.235 port 16750:11: [preauth] Jun 25 18:10:02.748886 sshd[1852]: Disconnected from authenticating user root 180.101.88.235 port 16750 [preauth] Jun 25 18:10:02.749000 audit[1852]: USER_ERR pid=1852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:10:02.752152 systemd[1]: sshd@12-136.144.54.109:22-180.101.88.235:16750.service: Deactivated successfully. Jun 25 18:10:02.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.109:22-180.101.88.235:16750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:10:02.867478 kernel: audit: type=1109 audit(1719339002.749:171): pid=1852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:10:02.867510 kernel: audit: type=1131 audit(1719339002.752:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.109:22-180.101.88.235:16750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:10:07.252715 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:07.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:07.252715 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:07.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:12.253474 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:12.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:12.253474 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:12.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:17.254467 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:17.253Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:17.254467 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:17.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:22.255546 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:22.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:22.255546 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:22.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:27.256384 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:27.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:27.256384 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:27.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:32.257179 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:32.256Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:32.257179 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:32.256Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:37.258911 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:37.257Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:37.258911 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:37.257Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:42.258708 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:42.258Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:42.258708 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:42.258Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:47.259942 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:47.259Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:47.259942 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:47.259Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:52.260876 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:52.260Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:52.260876 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:52.260Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:57.261567 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:57.260Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:10:57.261567 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:10:57.261Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:02.262134 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:02.261Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:02.262134 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:02.261Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:07.262459 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:07.261Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:07.262459 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:07.261Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:09.778976 systemd[1]: Started sshd@13-136.144.54.109:22-180.101.88.235:19470.service - OpenSSH per-connection server daemon (180.101.88.235:19470). Jun 25 18:11:09.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.109:22-180.101.88.235:19470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:09.873453 kernel: audit: type=1130 audit(1719339069.777:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.109:22-180.101.88.235:19470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:11.004925 sshd[1861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:11:11.004000 audit[1861]: USER_AUTH pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:11:11.097305 kernel: audit: type=1100 audit(1719339071.004:174): pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:11:12.263759 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:12.263Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:12.263759 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:12.263Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:12.487592 sshd[1859]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:11:12.814182 sshd[1862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:11:12.813000 audit[1862]: ANOM_LOGIN_FAILURES pid=1862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:12.814593 sshd[1862]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jun 25 18:11:12.813000 audit[1862]: USER_AUTH pid=1862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:11:12.904322 kernel: audit: type=2100 audit(1719339072.813:175): pid=1862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:12.904372 kernel: audit: type=1100 audit(1719339072.813:176): pid=1862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:11:14.236561 sshd[1859]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:11:14.563017 sshd[1863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:11:14.562000 audit[1863]: USER_AUTH pid=1863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:11:14.657438 kernel: audit: type=1100 audit(1719339074.562:177): pid=1863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:11:16.592737 sshd[1859]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:11:16.755220 sshd[1859]: Received disconnect from 180.101.88.235 port 19470:11: [preauth] Jun 25 18:11:16.755220 sshd[1859]: Disconnected from authenticating user root 180.101.88.235 port 19470 [preauth] Jun 25 18:11:16.754000 audit[1859]: USER_ERR pid=1859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:11:16.758554 systemd[1]: sshd@13-136.144.54.109:22-180.101.88.235:19470.service: Deactivated successfully. Jun 25 18:11:16.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.109:22-180.101.88.235:19470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:16.873294 kernel: audit: type=1109 audit(1719339076.754:178): pid=1859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:11:16.873406 kernel: audit: type=1131 audit(1719339076.757:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.109:22-180.101.88.235:19470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:17.264128 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:17.263Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:17.264128 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:17.263Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:22.264771 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:22.264Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:22.264771 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:22.264Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:27.265307 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:27.264Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:27.265307 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:27.264Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:32.265655 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:32.265Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:32.265655 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:32.265Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:37.266530 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:37.265Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:37.266530 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:37.266Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:42.267630 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:42.267Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:42.267630 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:42.267Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:47.268526 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:47.268Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:47.268526 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:47.268Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:52.269740 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:52.269Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:52.269740 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:52.269Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:57.270841 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:57.270Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:11:57.270841 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:11:57.270Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:02.271223 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:02.270Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:02.271223 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:02.270Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:07.272462 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:07.271Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:07.272462 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:07.271Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:12.272753 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:12.272Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:12.272753 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:12.272Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:17.273669 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:17.273Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:17.273669 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:17.273Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:21.464624 systemd[1]: Started sshd@14-136.144.54.109:22-180.101.88.235:55311.service - OpenSSH per-connection server daemon (180.101.88.235:55311). Jun 25 18:12:21.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.109:22-180.101.88.235:55311 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:12:21.558425 kernel: audit: type=1130 audit(1719339141.464:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.109:22-180.101.88.235:55311 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:12:22.274668 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:22.274Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:22.274668 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:22.274Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:22.493527 sshd[1873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:12:22.493000 audit[1873]: USER_AUTH pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:12:22.587433 kernel: audit: type=1100 audit(1719339142.493:181): pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:12:24.528031 sshd[1871]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:12:24.807911 sshd[1874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:12:24.807000 audit[1874]: ANOM_LOGIN_FAILURES pid=1874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:12:24.808343 sshd[1874]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jun 25 18:12:24.808000 audit[1874]: USER_AUTH pid=1874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:12:24.898451 kernel: audit: type=2100 audit(1719339144.807:182): pid=1874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:12:24.898481 kernel: audit: type=1100 audit(1719339144.808:183): pid=1874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:12:26.782446 sshd[1871]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:12:27.052649 sshd[1875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:12:27.052000 audit[1875]: USER_AUTH pid=1875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:12:27.146439 kernel: audit: type=1100 audit(1719339147.052:184): pid=1875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:12:27.275475 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:27.274Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:27.275475 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:27.275Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:29.302887 sshd[1871]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:12:29.436960 sshd[1871]: Received disconnect from 180.101.88.235 port 55311:11: [preauth] Jun 25 18:12:29.436960 sshd[1871]: Disconnected from authenticating user root 180.101.88.235 port 55311 [preauth] Jun 25 18:12:29.437000 audit[1871]: USER_ERR pid=1871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:12:29.440229 systemd[1]: sshd@14-136.144.54.109:22-180.101.88.235:55311.service: Deactivated successfully. Jun 25 18:12:29.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.109:22-180.101.88.235:55311 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:12:29.554831 kernel: audit: type=1109 audit(1719339149.437:185): pid=1871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:12:29.554866 kernel: audit: type=1131 audit(1719339149.440:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.109:22-180.101.88.235:55311 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:12:32.275682 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:32.275Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:32.275682 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:32.275Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:37.276912 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:37.275Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:37.276912 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:37.275Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:42.277361 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:42.276Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:42.277361 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:42.276Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:47.278313 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:47.277Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:47.278313 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:47.277Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:52.279031 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:52.278Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:52.279031 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:52.278Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:57.279739 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:57.279Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:57.279739 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:57.279Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:12:59.968616 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:12:59.968Z","caller":"traceutil/trace.go:171","msg":"trace[238231718] linearizableReadLoop","detail":"{readStateIndex:11; appliedIndex:12; }","duration":"155.289387ms","start":"2024-06-25T18:12:59.812Z","end":"2024-06-25T18:12:59.967Z","steps":["trace[238231718] 'read index received' (duration: 155.280464ms)","trace[238231718] 'applied index is now lower than readState.Index' (duration: 7.306µs)"],"step_count":2} Jun 25 18:12:59.968616 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:12:59.968Z","caller":"etcdserver/util.go:166","msg":"apply request took too long","took":"155.501017ms","expected-duration":"100ms","prefix":"read-only range ","request":"key:\"health\" ","response":"range_response_count:0 size:4"} Jun 25 18:12:59.968616 etcd-wrapper[1629]: {"level":"info","ts":"2024-06-25T18:12:59.968Z","caller":"traceutil/trace.go:171","msg":"trace[1182811558] range","detail":"{range_begin:health; range_end:; response_count:0; response_revision:1; }","duration":"155.646766ms","start":"2024-06-25T18:12:59.812Z","end":"2024-06-25T18:12:59.968Z","steps":["trace[1182811558] 'agreement among raft nodes before linearized reading' (duration: 155.459433ms)"],"step_count":1} Jun 25 18:13:02.279915 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:02.279Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:02.279915 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:02.279Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:07.280518 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:07.279Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:07.280518 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:07.279Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:12.280925 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:12.280Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:12.280925 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:12.280Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:17.282178 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:17.281Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:17.282178 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:17.281Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:22.283323 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:22.282Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:22.283323 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:22.282Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:27.284179 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:27.283Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:27.284179 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:27.283Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:32.285010 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:32.284Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:32.285010 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:32.284Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:37.285243 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:37.284Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:37.285243 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:37.284Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:38.681237 systemd[1]: Started sshd@15-136.144.54.109:22-180.101.88.235:56805.service - OpenSSH per-connection server daemon (180.101.88.235:56805). Jun 25 18:13:38.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.109:22-180.101.88.235:56805 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:13:38.775451 kernel: audit: type=1130 audit(1719339218.680:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.109:22-180.101.88.235:56805 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:13:39.729670 sshd[1883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:13:39.728000 audit[1883]: USER_AUTH pid=1883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:13:39.822437 kernel: audit: type=1100 audit(1719339219.728:188): pid=1883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:13:42.286301 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:42.285Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:42.286301 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:42.285Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:42.336179 sshd[1881]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:13:42.611108 sshd[1884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:13:42.610000 audit[1884]: ANOM_LOGIN_FAILURES pid=1884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:13:42.611643 sshd[1884]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jun 25 18:13:42.610000 audit[1884]: USER_AUTH pid=1884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:13:42.701675 kernel: audit: type=2100 audit(1719339222.610:189): pid=1884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:13:42.701728 kernel: audit: type=1100 audit(1719339222.610:190): pid=1884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:13:44.961657 sshd[1881]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:13:45.237142 sshd[1885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:13:45.236000 audit[1885]: USER_AUTH pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:13:45.331437 kernel: audit: type=1100 audit(1719339225.236:191): pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:13:47.287492 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:47.286Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:47.287492 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:47.287Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:47.331705 sshd[1881]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:13:47.468619 sshd[1881]: Received disconnect from 180.101.88.235 port 56805:11: [preauth] Jun 25 18:13:47.468619 sshd[1881]: Disconnected from authenticating user root 180.101.88.235 port 56805 [preauth] Jun 25 18:13:47.468000 audit[1881]: USER_ERR pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:13:47.471941 systemd[1]: sshd@15-136.144.54.109:22-180.101.88.235:56805.service: Deactivated successfully. Jun 25 18:13:47.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.109:22-180.101.88.235:56805 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:13:47.586657 kernel: audit: type=1109 audit(1719339227.468:192): pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:13:47.586689 kernel: audit: type=1131 audit(1719339227.471:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.109:22-180.101.88.235:56805 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:13:52.288929 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:52.288Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:52.288929 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:52.288Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:57.289774 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:57.289Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:13:57.289774 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:13:57.289Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:02.290855 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:02.290Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:02.290855 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:02.290Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:07.291158 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:07.290Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:07.291158 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:07.290Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:12.292110 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:12.291Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:12.292110 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:12.291Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:17.293099 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:17.292Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:17.293099 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:17.292Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:22.294202 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:22.293Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:22.294202 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:22.293Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:27.295262 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:27.294Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:27.295262 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:27.294Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:32.296416 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:32.295Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:32.296416 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:32.295Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:37.297463 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:37.296Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:37.297463 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:37.296Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:42.297654 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:42.297Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:42.297654 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:42.297Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:47.298253 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:47.297Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:47.298253 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:47.297Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:52.298962 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:52.298Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:52.298962 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:52.298Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:56.501812 systemd[1]: Started sshd@16-136.144.54.109:22-180.101.88.235:53633.service - OpenSSH per-connection server daemon (180.101.88.235:53633). Jun 25 18:14:56.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.109:22-180.101.88.235:53633 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:14:56.596437 kernel: audit: type=1130 audit(1719339296.500:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.109:22-180.101.88.235:53633 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:14:57.299094 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:57.298Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:57.299094 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:14:57.298Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:14:57.591808 sshd[1890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:14:57.590000 audit[1890]: USER_AUTH pid=1890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:14:57.685447 kernel: audit: type=1100 audit(1719339297.590:195): pid=1890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:14:59.571174 sshd[1888]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:14:59.859256 sshd[1891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:14:59.858000 audit[1891]: ANOM_LOGIN_FAILURES pid=1891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:14:59.859672 sshd[1891]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jun 25 18:14:59.858000 audit[1891]: USER_AUTH pid=1891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:14:59.949487 kernel: audit: type=2100 audit(1719339299.858:196): pid=1891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jun 25 18:14:59.949517 kernel: audit: type=1100 audit(1719339299.858:197): pid=1891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:15:01.778601 sshd[1888]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:15:02.067048 sshd[1892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:15:02.066000 audit[1892]: USER_AUTH pid=1892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:15:02.161443 kernel: audit: type=1100 audit(1719339302.066:198): pid=1892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:15:02.300108 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:02.299Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:02.300108 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:02.299Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:04.262173 sshd[1888]: PAM: Permission denied for root from 180.101.88.235 Jun 25 18:15:04.405648 sshd[1888]: Received disconnect from 180.101.88.235 port 53633:11: [preauth] Jun 25 18:15:04.405648 sshd[1888]: Disconnected from authenticating user root 180.101.88.235 port 53633 [preauth] Jun 25 18:15:04.405000 audit[1888]: USER_ERR pid=1888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:15:04.408961 systemd[1]: sshd@16-136.144.54.109:22-180.101.88.235:53633.service: Deactivated successfully. Jun 25 18:15:04.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.109:22-180.101.88.235:53633 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:15:04.523708 kernel: audit: type=1109 audit(1719339304.405:199): pid=1888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:15:04.523741 kernel: audit: type=1131 audit(1719339304.408:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.109:22-180.101.88.235:53633 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:15:07.300373 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:07.299Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:07.300373 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:07.299Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:12.301161 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:12.300Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:12.301161 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:12.300Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:17.301878 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:17.301Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:17.301878 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:17.301Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:22.302611 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:22.301Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:22.302611 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:22.302Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:27.302986 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:27.302Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:27.302986 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:27.302Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:32.303806 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:32.303Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:32.303806 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:32.303Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:37.304626 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:37.304Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:37.304626 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:37.304Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:42.305196 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:42.304Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:42.305196 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:42.304Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:47.306221 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:47.305Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:47.306221 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:47.305Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:52.306925 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:52.306Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:52.306925 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:52.306Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:57.307934 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:57.307Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:15:57.307934 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:15:57.307Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:16:02.308571 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:02.307Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: connect: no route to host"} Jun 25 18:16:02.308571 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:02.308Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: connect: no route to host"} Jun 25 18:16:07.308786 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:07.308Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:16:07.308786 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:07.308Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:16:12.309706 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:12.309Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:16:12.309706 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:12.309Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:16:17.310113 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:17.309Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: connect: no route to host"} Jun 25 18:16:17.310113 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:17.309Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: connect: no route to host"} Jun 25 18:16:19.395604 systemd[1]: Started sshd@17-136.144.54.109:22-180.101.88.235:36784.service - OpenSSH per-connection server daemon (180.101.88.235:36784). Jun 25 18:16:19.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.109:22-180.101.88.235:36784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:19.489438 kernel: audit: type=1130 audit(1719339379.394:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.109:22-180.101.88.235:36784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:20.439038 sshd[1898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.235 user=root Jun 25 18:16:20.438000 audit[1898]: USER_AUTH pid=1898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:16:20.531322 kernel: audit: type=1100 audit(1719339380.438:202): pid=1898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.235 addr=180.101.88.235 terminal=ssh res=failed' Jun 25 18:16:22.311547 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:22.310Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"3bd8077294aa7e3d","rtt":"206.249µs","error":"dial tcp 10.67.80.25:2380: connect: no route to host"} Jun 25 18:16:22.311547 etcd-wrapper[1629]: {"level":"warn","ts":"2024-06-25T18:16:22.310Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"3bd8077294aa7e3d","rtt":"178.129µs","error":"dial tcp 10.67.80.25:2380: i/o timeout"} Jun 25 18:16:23.145982 sshd[1896]: PAM: Permission denied for root from 180.101.88.235