Jun 25 18:06:00.684261 kernel: microcode: microcode updated early to revision 0xfa, date = 2023-02-27 Jun 25 18:06:00.684272 kernel: Linux version 6.1.95-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.2.1_p20230826 p7) 13.2.1 20230826, GNU ld (Gentoo 2.40 p5) 2.40.0) #1 SMP PREEMPT_DYNAMIC Tue Jun 25 13:16:37 -00 2024 Jun 25 18:06:00.684278 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=05dd62847a393595c8cf7409b58afa2d4045a2186c3cd58722296be6f3bc4fa9 Jun 25 18:06:00.684283 kernel: BIOS-provided physical RAM map: Jun 25 18:06:00.684287 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Jun 25 18:06:00.684290 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Jun 25 18:06:00.684295 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Jun 25 18:06:00.684299 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Jun 25 18:06:00.684302 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Jun 25 18:06:00.684306 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819ddfff] usable Jun 25 18:06:00.684310 kernel: BIOS-e820: [mem 0x00000000819de000-0x00000000819defff] ACPI NVS Jun 25 18:06:00.684314 kernel: BIOS-e820: [mem 0x00000000819df000-0x00000000819dffff] reserved Jun 25 18:06:00.684318 kernel: BIOS-e820: [mem 0x00000000819e0000-0x000000008afccfff] usable Jun 25 18:06:00.684322 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Jun 25 18:06:00.684326 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Jun 25 18:06:00.684330 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Jun 25 18:06:00.684335 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Jun 25 18:06:00.684339 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Jun 25 18:06:00.684343 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Jun 25 18:06:00.684347 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Jun 25 18:06:00.684351 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Jun 25 18:06:00.684355 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Jun 25 18:06:00.684359 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Jun 25 18:06:00.684363 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Jun 25 18:06:00.684367 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Jun 25 18:06:00.684371 kernel: NX (Execute Disable) protection: active Jun 25 18:06:00.684375 kernel: SMBIOS 3.2.1 present. Jun 25 18:06:00.684379 kernel: DMI: Supermicro X11SCM-F/X11SCM-F, BIOS 1.9 09/16/2022 Jun 25 18:06:00.684387 kernel: tsc: Detected 3400.000 MHz processor Jun 25 18:06:00.684391 kernel: tsc: Detected 3399.906 MHz TSC Jun 25 18:06:00.684395 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jun 25 18:06:00.684419 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jun 25 18:06:00.684423 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Jun 25 18:06:00.684428 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jun 25 18:06:00.684448 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Jun 25 18:06:00.684452 kernel: Using GB pages for direct mapping Jun 25 18:06:00.684456 kernel: ACPI: Early table checksum verification disabled Jun 25 18:06:00.684461 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Jun 25 18:06:00.684465 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Jun 25 18:06:00.684470 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Jun 25 18:06:00.684476 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Jun 25 18:06:00.684480 kernel: ACPI: FACS 0x000000008C66CF80 000040 Jun 25 18:06:00.684485 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Jun 25 18:06:00.684489 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Jun 25 18:06:00.684495 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Jun 25 18:06:00.684500 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Jun 25 18:06:00.684504 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Jun 25 18:06:00.684509 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Jun 25 18:06:00.684513 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Jun 25 18:06:00.684518 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Jun 25 18:06:00.684522 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:00.684528 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Jun 25 18:06:00.684532 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Jun 25 18:06:00.684537 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:00.684541 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:00.684546 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Jun 25 18:06:00.684550 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Jun 25 18:06:00.684555 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:00.684559 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Jun 25 18:06:00.684565 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Jun 25 18:06:00.684569 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Jun 25 18:06:00.684574 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Jun 25 18:06:00.684579 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Jun 25 18:06:00.684583 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Jun 25 18:06:00.684588 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Jun 25 18:06:00.684592 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Jun 25 18:06:00.684597 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Jun 25 18:06:00.684601 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Jun 25 18:06:00.684607 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Jun 25 18:06:00.684611 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Jun 25 18:06:00.684616 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Jun 25 18:06:00.684620 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Jun 25 18:06:00.684625 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Jun 25 18:06:00.684629 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Jun 25 18:06:00.684634 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Jun 25 18:06:00.684638 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Jun 25 18:06:00.684643 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Jun 25 18:06:00.684648 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Jun 25 18:06:00.684653 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Jun 25 18:06:00.684657 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Jun 25 18:06:00.684662 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Jun 25 18:06:00.684666 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Jun 25 18:06:00.684671 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Jun 25 18:06:00.684675 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Jun 25 18:06:00.684680 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Jun 25 18:06:00.684684 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Jun 25 18:06:00.684690 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Jun 25 18:06:00.684694 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Jun 25 18:06:00.684699 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Jun 25 18:06:00.684703 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Jun 25 18:06:00.684708 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Jun 25 18:06:00.684712 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Jun 25 18:06:00.684717 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Jun 25 18:06:00.684721 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Jun 25 18:06:00.684726 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Jun 25 18:06:00.684731 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Jun 25 18:06:00.684736 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Jun 25 18:06:00.684740 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Jun 25 18:06:00.684745 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Jun 25 18:06:00.684749 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Jun 25 18:06:00.684754 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Jun 25 18:06:00.684758 kernel: No NUMA configuration found Jun 25 18:06:00.684763 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Jun 25 18:06:00.684768 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Jun 25 18:06:00.684772 kernel: Zone ranges: Jun 25 18:06:00.684778 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jun 25 18:06:00.684782 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jun 25 18:06:00.684787 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Jun 25 18:06:00.684791 kernel: Movable zone start for each node Jun 25 18:06:00.684796 kernel: Early memory node ranges Jun 25 18:06:00.684800 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Jun 25 18:06:00.684805 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Jun 25 18:06:00.684809 kernel: node 0: [mem 0x0000000040400000-0x00000000819ddfff] Jun 25 18:06:00.684814 kernel: node 0: [mem 0x00000000819e0000-0x000000008afccfff] Jun 25 18:06:00.684819 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Jun 25 18:06:00.684824 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Jun 25 18:06:00.684828 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Jun 25 18:06:00.684833 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Jun 25 18:06:00.684841 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jun 25 18:06:00.684847 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Jun 25 18:06:00.684852 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Jun 25 18:06:00.684857 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Jun 25 18:06:00.684862 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Jun 25 18:06:00.684867 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Jun 25 18:06:00.684872 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Jun 25 18:06:00.684877 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Jun 25 18:06:00.684882 kernel: ACPI: PM-Timer IO Port: 0x1808 Jun 25 18:06:00.684887 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Jun 25 18:06:00.684892 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Jun 25 18:06:00.684897 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Jun 25 18:06:00.684901 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Jun 25 18:06:00.684907 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Jun 25 18:06:00.684912 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Jun 25 18:06:00.684917 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Jun 25 18:06:00.684922 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Jun 25 18:06:00.684926 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Jun 25 18:06:00.684931 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Jun 25 18:06:00.684936 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Jun 25 18:06:00.684941 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Jun 25 18:06:00.684945 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Jun 25 18:06:00.684951 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Jun 25 18:06:00.684956 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Jun 25 18:06:00.684961 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Jun 25 18:06:00.684966 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Jun 25 18:06:00.684970 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jun 25 18:06:00.684975 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jun 25 18:06:00.684980 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jun 25 18:06:00.684985 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jun 25 18:06:00.684990 kernel: TSC deadline timer available Jun 25 18:06:00.684996 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Jun 25 18:06:00.685001 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Jun 25 18:06:00.685005 kernel: Booting paravirtualized kernel on bare hardware Jun 25 18:06:00.685010 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jun 25 18:06:00.685015 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1 Jun 25 18:06:00.685020 kernel: percpu: Embedded 57 pages/cpu s194792 r8192 d30488 u262144 Jun 25 18:06:00.685025 kernel: pcpu-alloc: s194792 r8192 d30488 u262144 alloc=1*2097152 Jun 25 18:06:00.685030 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Jun 25 18:06:00.685035 kernel: Fallback order for Node 0: 0 Jun 25 18:06:00.685040 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Jun 25 18:06:00.685045 kernel: Policy zone: Normal Jun 25 18:06:00.685051 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=05dd62847a393595c8cf7409b58afa2d4045a2186c3cd58722296be6f3bc4fa9 Jun 25 18:06:00.685056 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jun 25 18:06:00.685060 kernel: random: crng init done Jun 25 18:06:00.685065 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Jun 25 18:06:00.685070 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Jun 25 18:06:00.685075 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jun 25 18:06:00.685081 kernel: software IO TLB: area num 16. Jun 25 18:06:00.685086 kernel: Memory: 32716396K/33452980K available (12293K kernel code, 2301K rwdata, 19992K rodata, 47156K init, 4308K bss, 736324K reserved, 0K cma-reserved) Jun 25 18:06:00.685091 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Jun 25 18:06:00.685096 kernel: ftrace: allocating 36080 entries in 141 pages Jun 25 18:06:00.685101 kernel: ftrace: allocated 141 pages with 4 groups Jun 25 18:06:00.685105 kernel: Dynamic Preempt: voluntary Jun 25 18:06:00.685110 kernel: rcu: Preemptible hierarchical RCU implementation. Jun 25 18:06:00.685116 kernel: rcu: RCU event tracing is enabled. Jun 25 18:06:00.685121 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Jun 25 18:06:00.685126 kernel: Trampoline variant of Tasks RCU enabled. Jun 25 18:06:00.685131 kernel: Rude variant of Tasks RCU enabled. Jun 25 18:06:00.685136 kernel: Tracing variant of Tasks RCU enabled. Jun 25 18:06:00.685141 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jun 25 18:06:00.685146 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Jun 25 18:06:00.685151 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Jun 25 18:06:00.685156 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jun 25 18:06:00.685161 kernel: Console: colour dummy device 80x25 Jun 25 18:06:00.685165 kernel: printk: console [tty0] enabled Jun 25 18:06:00.685170 kernel: printk: console [ttyS1] enabled Jun 25 18:06:00.685176 kernel: ACPI: Core revision 20220331 Jun 25 18:06:00.685181 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Jun 25 18:06:00.685186 kernel: APIC: Switch to symmetric I/O mode setup Jun 25 18:06:00.685191 kernel: DMAR: Host address width 39 Jun 25 18:06:00.685196 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Jun 25 18:06:00.685201 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Jun 25 18:06:00.685206 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Jun 25 18:06:00.685211 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Jun 25 18:06:00.685216 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Jun 25 18:06:00.685221 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Jun 25 18:06:00.685226 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Jun 25 18:06:00.685231 kernel: x2apic enabled Jun 25 18:06:00.685236 kernel: Switched APIC routing to cluster x2apic. Jun 25 18:06:00.685241 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Jun 25 18:06:00.685246 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Jun 25 18:06:00.685251 kernel: CPU0: Thermal monitoring enabled (TM1) Jun 25 18:06:00.685256 kernel: process: using mwait in idle threads Jun 25 18:06:00.685260 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jun 25 18:06:00.685266 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jun 25 18:06:00.685271 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jun 25 18:06:00.685275 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jun 25 18:06:00.685280 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jun 25 18:06:00.685285 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Jun 25 18:06:00.685290 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jun 25 18:06:00.685295 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Jun 25 18:06:00.685299 kernel: RETBleed: Mitigation: Enhanced IBRS Jun 25 18:06:00.685304 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jun 25 18:06:00.685309 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Jun 25 18:06:00.685314 kernel: TAA: Mitigation: TSX disabled Jun 25 18:06:00.685319 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Jun 25 18:06:00.685324 kernel: SRBDS: Mitigation: Microcode Jun 25 18:06:00.685329 kernel: GDS: Mitigation: Microcode Jun 25 18:06:00.685334 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jun 25 18:06:00.685339 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jun 25 18:06:00.685343 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jun 25 18:06:00.685348 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Jun 25 18:06:00.685353 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Jun 25 18:06:00.685358 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jun 25 18:06:00.685363 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Jun 25 18:06:00.685367 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Jun 25 18:06:00.685373 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Jun 25 18:06:00.685378 kernel: Freeing SMP alternatives memory: 32K Jun 25 18:06:00.685384 kernel: pid_max: default: 32768 minimum: 301 Jun 25 18:06:00.685389 kernel: LSM: Security Framework initializing Jun 25 18:06:00.685394 kernel: SELinux: Initializing. Jun 25 18:06:00.685424 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jun 25 18:06:00.685430 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jun 25 18:06:00.685434 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Jun 25 18:06:00.685439 kernel: cblist_init_generic: Setting adjustable number of callback queues. Jun 25 18:06:00.685465 kernel: cblist_init_generic: Setting shift to 4 and lim to 1. Jun 25 18:06:00.685470 kernel: cblist_init_generic: Setting adjustable number of callback queues. Jun 25 18:06:00.685476 kernel: cblist_init_generic: Setting shift to 4 and lim to 1. Jun 25 18:06:00.685481 kernel: cblist_init_generic: Setting adjustable number of callback queues. Jun 25 18:06:00.685485 kernel: cblist_init_generic: Setting shift to 4 and lim to 1. Jun 25 18:06:00.685490 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Jun 25 18:06:00.685495 kernel: ... version: 4 Jun 25 18:06:00.685500 kernel: ... bit width: 48 Jun 25 18:06:00.685505 kernel: ... generic registers: 4 Jun 25 18:06:00.685510 kernel: ... value mask: 0000ffffffffffff Jun 25 18:06:00.685515 kernel: ... max period: 00007fffffffffff Jun 25 18:06:00.685519 kernel: ... fixed-purpose events: 3 Jun 25 18:06:00.685525 kernel: ... event mask: 000000070000000f Jun 25 18:06:00.685530 kernel: signal: max sigframe size: 2032 Jun 25 18:06:00.685535 kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Jun 25 18:06:00.685540 kernel: rcu: Hierarchical SRCU implementation. Jun 25 18:06:00.685545 kernel: rcu: Max phase no-delay instances is 400. Jun 25 18:06:00.685550 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Jun 25 18:06:00.685555 kernel: smp: Bringing up secondary CPUs ... Jun 25 18:06:00.685559 kernel: x86: Booting SMP configuration: Jun 25 18:06:00.685564 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Jun 25 18:06:00.685570 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jun 25 18:06:00.685575 kernel: #9 #10 #11 #12 #13 #14 #15 Jun 25 18:06:00.685580 kernel: smp: Brought up 1 node, 16 CPUs Jun 25 18:06:00.685585 kernel: smpboot: Max logical packages: 1 Jun 25 18:06:00.685590 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Jun 25 18:06:00.685595 kernel: devtmpfs: initialized Jun 25 18:06:00.685600 kernel: x86/mm: Memory block size: 128MB Jun 25 18:06:00.685605 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819de000-0x819defff] (4096 bytes) Jun 25 18:06:00.685610 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Jun 25 18:06:00.685615 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jun 25 18:06:00.685620 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Jun 25 18:06:00.685625 kernel: pinctrl core: initialized pinctrl subsystem Jun 25 18:06:00.685630 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jun 25 18:06:00.685635 kernel: audit: initializing netlink subsys (disabled) Jun 25 18:06:00.685640 kernel: audit: type=2000 audit(1719338755.057:1): state=initialized audit_enabled=0 res=1 Jun 25 18:06:00.685645 kernel: thermal_sys: Registered thermal governor 'step_wise' Jun 25 18:06:00.685650 kernel: thermal_sys: Registered thermal governor 'user_space' Jun 25 18:06:00.685655 kernel: cpuidle: using governor menu Jun 25 18:06:00.685660 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jun 25 18:06:00.685665 kernel: dca service started, version 1.12.1 Jun 25 18:06:00.685670 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Jun 25 18:06:00.685675 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Jun 25 18:06:00.685680 kernel: PCI: Using configuration type 1 for base access Jun 25 18:06:00.685685 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Jun 25 18:06:00.685689 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jun 25 18:06:00.685694 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Jun 25 18:06:00.685700 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Jun 25 18:06:00.685705 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Jun 25 18:06:00.685710 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Jun 25 18:06:00.685715 kernel: ACPI: Added _OSI(Module Device) Jun 25 18:06:00.685720 kernel: ACPI: Added _OSI(Processor Device) Jun 25 18:06:00.685725 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jun 25 18:06:00.685729 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jun 25 18:06:00.685734 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Jun 25 18:06:00.685739 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:00.685745 kernel: ACPI: SSDT 0xFFFF95B681F91100 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Jun 25 18:06:00.685750 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Jun 25 18:06:00.685755 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:00.685760 kernel: ACPI: SSDT 0xFFFF95B681B40000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Jun 25 18:06:00.685765 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:00.685769 kernel: ACPI: SSDT 0xFFFF95B681AFB000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Jun 25 18:06:00.685774 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:00.685779 kernel: ACPI: SSDT 0xFFFF95B681F62000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Jun 25 18:06:00.685784 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:00.685788 kernel: ACPI: SSDT 0xFFFF95B68015E000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Jun 25 18:06:00.685794 kernel: ACPI: Dynamic OEM Table Load: Jun 25 18:06:00.685799 kernel: ACPI: SSDT 0xFFFF95B681B43400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Jun 25 18:06:00.685804 kernel: ACPI: Interpreter enabled Jun 25 18:06:00.685809 kernel: ACPI: PM: (supports S0 S5) Jun 25 18:06:00.685814 kernel: ACPI: Using IOAPIC for interrupt routing Jun 25 18:06:00.685818 kernel: HEST: Enabling Firmware First mode for corrected errors. Jun 25 18:06:00.685823 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Jun 25 18:06:00.685828 kernel: HEST: Table parsing has been initialized. Jun 25 18:06:00.685833 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Jun 25 18:06:00.685839 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jun 25 18:06:00.685844 kernel: PCI: Using E820 reservations for host bridge windows Jun 25 18:06:00.685849 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Jun 25 18:06:00.685854 kernel: ACPI: PM: Power Resource [USBC] Jun 25 18:06:00.685858 kernel: ACPI: PM: Power Resource [V0PR] Jun 25 18:06:00.685863 kernel: ACPI: PM: Power Resource [V1PR] Jun 25 18:06:00.685868 kernel: ACPI: PM: Power Resource [V2PR] Jun 25 18:06:00.685873 kernel: ACPI: PM: Power Resource [WRST] Jun 25 18:06:00.685878 kernel: ACPI: PM: Power Resource [FN00] Jun 25 18:06:00.685883 kernel: ACPI: PM: Power Resource [FN01] Jun 25 18:06:00.685888 kernel: ACPI: PM: Power Resource [FN02] Jun 25 18:06:00.685893 kernel: ACPI: PM: Power Resource [FN03] Jun 25 18:06:00.685898 kernel: ACPI: PM: Power Resource [FN04] Jun 25 18:06:00.685902 kernel: ACPI: PM: Power Resource [PIN] Jun 25 18:06:00.685907 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Jun 25 18:06:00.685986 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jun 25 18:06:00.686083 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Jun 25 18:06:00.686129 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Jun 25 18:06:00.686136 kernel: PCI host bridge to bus 0000:00 Jun 25 18:06:00.686181 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jun 25 18:06:00.686220 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jun 25 18:06:00.686260 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jun 25 18:06:00.686297 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Jun 25 18:06:00.686334 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Jun 25 18:06:00.686375 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Jun 25 18:06:00.686474 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Jun 25 18:06:00.686527 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Jun 25 18:06:00.686572 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:00.686621 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Jun 25 18:06:00.686664 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Jun 25 18:06:00.686714 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Jun 25 18:06:00.686760 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Jun 25 18:06:00.686810 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Jun 25 18:06:00.686854 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Jun 25 18:06:00.686899 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Jun 25 18:06:00.686947 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Jun 25 18:06:00.686993 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Jun 25 18:06:00.687036 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Jun 25 18:06:00.687083 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Jun 25 18:06:00.687126 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jun 25 18:06:00.687176 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Jun 25 18:06:00.687219 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jun 25 18:06:00.687268 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Jun 25 18:06:00.687318 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Jun 25 18:06:00.687363 kernel: pci 0000:00:16.0: PME# supported from D3hot Jun 25 18:06:00.687465 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Jun 25 18:06:00.687508 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Jun 25 18:06:00.687552 kernel: pci 0000:00:16.1: PME# supported from D3hot Jun 25 18:06:00.687598 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Jun 25 18:06:00.687645 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Jun 25 18:06:00.687687 kernel: pci 0000:00:16.4: PME# supported from D3hot Jun 25 18:06:00.687734 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Jun 25 18:06:00.687777 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Jun 25 18:06:00.687820 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Jun 25 18:06:00.687862 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Jun 25 18:06:00.687904 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Jun 25 18:06:00.687950 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Jun 25 18:06:00.687995 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Jun 25 18:06:00.688040 kernel: pci 0000:00:17.0: PME# supported from D3hot Jun 25 18:06:00.688086 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Jun 25 18:06:00.688134 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:00.688183 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Jun 25 18:06:00.688227 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Jun 25 18:06:00.688277 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Jun 25 18:06:00.688320 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Jun 25 18:06:00.688368 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Jun 25 18:06:00.688441 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:00.688510 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Jun 25 18:06:00.688554 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Jun 25 18:06:00.688602 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Jun 25 18:06:00.688646 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jun 25 18:06:00.688695 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Jun 25 18:06:00.688744 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Jun 25 18:06:00.688788 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Jun 25 18:06:00.688831 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Jun 25 18:06:00.688880 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Jun 25 18:06:00.688925 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Jun 25 18:06:00.688974 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Jun 25 18:06:00.689023 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Jun 25 18:06:00.689068 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Jun 25 18:06:00.689112 kernel: pci 0000:01:00.0: PME# supported from D3cold Jun 25 18:06:00.689158 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jun 25 18:06:00.689201 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jun 25 18:06:00.689252 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Jun 25 18:06:00.689296 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Jun 25 18:06:00.689344 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Jun 25 18:06:00.689392 kernel: pci 0000:01:00.1: PME# supported from D3cold Jun 25 18:06:00.689487 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jun 25 18:06:00.689532 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jun 25 18:06:00.689577 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jun 25 18:06:00.689622 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Jun 25 18:06:00.689666 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jun 25 18:06:00.689710 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Jun 25 18:06:00.689762 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Jun 25 18:06:00.689810 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Jun 25 18:06:00.689855 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Jun 25 18:06:00.689900 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Jun 25 18:06:00.689944 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Jun 25 18:06:00.689989 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:00.690033 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Jun 25 18:06:00.690081 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jun 25 18:06:00.690125 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Jun 25 18:06:00.690175 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Jun 25 18:06:00.690219 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Jun 25 18:06:00.690264 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Jun 25 18:06:00.690309 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Jun 25 18:06:00.690353 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Jun 25 18:06:00.690421 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Jun 25 18:06:00.690484 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Jun 25 18:06:00.690528 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jun 25 18:06:00.690571 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Jun 25 18:06:00.690616 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Jun 25 18:06:00.690665 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Jun 25 18:06:00.690711 kernel: pci 0000:06:00.0: enabling Extended Tags Jun 25 18:06:00.690756 kernel: pci 0000:06:00.0: supports D1 D2 Jun 25 18:06:00.690804 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jun 25 18:06:00.690848 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Jun 25 18:06:00.690891 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Jun 25 18:06:00.690935 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Jun 25 18:06:00.690986 kernel: pci_bus 0000:07: extended config space not accessible Jun 25 18:06:00.691039 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Jun 25 18:06:00.691086 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Jun 25 18:06:00.691137 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Jun 25 18:06:00.691183 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Jun 25 18:06:00.691231 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jun 25 18:06:00.691278 kernel: pci 0000:07:00.0: supports D1 D2 Jun 25 18:06:00.691326 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jun 25 18:06:00.691371 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Jun 25 18:06:00.691464 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Jun 25 18:06:00.691510 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Jun 25 18:06:00.691520 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Jun 25 18:06:00.691526 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Jun 25 18:06:00.691531 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Jun 25 18:06:00.691536 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Jun 25 18:06:00.691541 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Jun 25 18:06:00.691547 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Jun 25 18:06:00.691552 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Jun 25 18:06:00.691557 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Jun 25 18:06:00.691563 kernel: iommu: Default domain type: Translated Jun 25 18:06:00.691568 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jun 25 18:06:00.691574 kernel: pps_core: LinuxPPS API ver. 1 registered Jun 25 18:06:00.691579 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jun 25 18:06:00.691584 kernel: PTP clock support registered Jun 25 18:06:00.691590 kernel: PCI: Using ACPI for IRQ routing Jun 25 18:06:00.691595 kernel: PCI: pci_cache_line_size set to 64 bytes Jun 25 18:06:00.691600 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Jun 25 18:06:00.691605 kernel: e820: reserve RAM buffer [mem 0x819de000-0x83ffffff] Jun 25 18:06:00.691611 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Jun 25 18:06:00.691616 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Jun 25 18:06:00.691621 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Jun 25 18:06:00.691626 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Jun 25 18:06:00.691673 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Jun 25 18:06:00.691720 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Jun 25 18:06:00.691768 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jun 25 18:06:00.691776 kernel: vgaarb: loaded Jun 25 18:06:00.691781 kernel: clocksource: Switched to clocksource tsc-early Jun 25 18:06:00.691788 kernel: VFS: Disk quotas dquot_6.6.0 Jun 25 18:06:00.691793 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jun 25 18:06:00.691798 kernel: pnp: PnP ACPI init Jun 25 18:06:00.691843 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Jun 25 18:06:00.691887 kernel: pnp 00:02: [dma 0 disabled] Jun 25 18:06:00.691929 kernel: pnp 00:03: [dma 0 disabled] Jun 25 18:06:00.691974 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Jun 25 18:06:00.692016 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Jun 25 18:06:00.692057 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Jun 25 18:06:00.692100 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Jun 25 18:06:00.692138 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Jun 25 18:06:00.692177 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Jun 25 18:06:00.692216 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Jun 25 18:06:00.692256 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Jun 25 18:06:00.692294 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Jun 25 18:06:00.692332 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Jun 25 18:06:00.692371 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Jun 25 18:06:00.692462 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Jun 25 18:06:00.692502 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Jun 25 18:06:00.692539 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Jun 25 18:06:00.692580 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Jun 25 18:06:00.692618 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Jun 25 18:06:00.692656 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Jun 25 18:06:00.692695 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Jun 25 18:06:00.692736 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Jun 25 18:06:00.692744 kernel: pnp: PnP ACPI: found 10 devices Jun 25 18:06:00.692749 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jun 25 18:06:00.692754 kernel: NET: Registered PF_INET protocol family Jun 25 18:06:00.692761 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jun 25 18:06:00.692766 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Jun 25 18:06:00.692772 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jun 25 18:06:00.692777 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jun 25 18:06:00.692782 kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Jun 25 18:06:00.692788 kernel: TCP: Hash tables configured (established 262144 bind 65536) Jun 25 18:06:00.692793 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Jun 25 18:06:00.692798 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Jun 25 18:06:00.692804 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jun 25 18:06:00.692809 kernel: NET: Registered PF_XDP protocol family Jun 25 18:06:00.692854 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Jun 25 18:06:00.692898 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Jun 25 18:06:00.692942 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Jun 25 18:06:00.692989 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Jun 25 18:06:00.693035 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jun 25 18:06:00.693080 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Jun 25 18:06:00.693127 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jun 25 18:06:00.693173 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jun 25 18:06:00.693216 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Jun 25 18:06:00.693260 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jun 25 18:06:00.693304 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Jun 25 18:06:00.693350 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Jun 25 18:06:00.693420 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jun 25 18:06:00.693487 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Jun 25 18:06:00.693530 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Jun 25 18:06:00.693574 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jun 25 18:06:00.693618 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Jun 25 18:06:00.693661 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Jun 25 18:06:00.693707 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Jun 25 18:06:00.693751 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Jun 25 18:06:00.693799 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Jun 25 18:06:00.693843 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Jun 25 18:06:00.693888 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Jun 25 18:06:00.693931 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Jun 25 18:06:00.693969 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Jun 25 18:06:00.694009 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jun 25 18:06:00.694047 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jun 25 18:06:00.694085 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jun 25 18:06:00.694124 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Jun 25 18:06:00.694163 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Jun 25 18:06:00.694208 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Jun 25 18:06:00.694249 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Jun 25 18:06:00.694295 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Jun 25 18:06:00.694335 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Jun 25 18:06:00.694380 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Jun 25 18:06:00.694473 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Jun 25 18:06:00.694518 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Jun 25 18:06:00.694558 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Jun 25 18:06:00.694600 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Jun 25 18:06:00.694643 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Jun 25 18:06:00.694650 kernel: PCI: CLS 64 bytes, default 64 Jun 25 18:06:00.694657 kernel: DMAR: No ATSR found Jun 25 18:06:00.694662 kernel: DMAR: No SATC found Jun 25 18:06:00.694668 kernel: DMAR: dmar0: Using Queued invalidation Jun 25 18:06:00.694711 kernel: pci 0000:00:00.0: Adding to iommu group 0 Jun 25 18:06:00.694757 kernel: pci 0000:00:01.0: Adding to iommu group 1 Jun 25 18:06:00.694801 kernel: pci 0000:00:08.0: Adding to iommu group 2 Jun 25 18:06:00.694845 kernel: pci 0000:00:12.0: Adding to iommu group 3 Jun 25 18:06:00.694888 kernel: pci 0000:00:14.0: Adding to iommu group 4 Jun 25 18:06:00.694932 kernel: pci 0000:00:14.2: Adding to iommu group 4 Jun 25 18:06:00.694977 kernel: pci 0000:00:15.0: Adding to iommu group 5 Jun 25 18:06:00.695019 kernel: pci 0000:00:15.1: Adding to iommu group 5 Jun 25 18:06:00.695062 kernel: pci 0000:00:16.0: Adding to iommu group 6 Jun 25 18:06:00.695105 kernel: pci 0000:00:16.1: Adding to iommu group 6 Jun 25 18:06:00.695148 kernel: pci 0000:00:16.4: Adding to iommu group 6 Jun 25 18:06:00.695191 kernel: pci 0000:00:17.0: Adding to iommu group 7 Jun 25 18:06:00.695235 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Jun 25 18:06:00.695278 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Jun 25 18:06:00.695323 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Jun 25 18:06:00.695368 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Jun 25 18:06:00.695457 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Jun 25 18:06:00.695501 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Jun 25 18:06:00.695543 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Jun 25 18:06:00.695588 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Jun 25 18:06:00.695630 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Jun 25 18:06:00.695676 kernel: pci 0000:01:00.0: Adding to iommu group 1 Jun 25 18:06:00.695723 kernel: pci 0000:01:00.1: Adding to iommu group 1 Jun 25 18:06:00.695769 kernel: pci 0000:03:00.0: Adding to iommu group 15 Jun 25 18:06:00.695814 kernel: pci 0000:04:00.0: Adding to iommu group 16 Jun 25 18:06:00.695859 kernel: pci 0000:06:00.0: Adding to iommu group 17 Jun 25 18:06:00.695907 kernel: pci 0000:07:00.0: Adding to iommu group 17 Jun 25 18:06:00.695914 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Jun 25 18:06:00.695920 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jun 25 18:06:00.695925 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Jun 25 18:06:00.695930 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Jun 25 18:06:00.695937 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Jun 25 18:06:00.695942 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Jun 25 18:06:00.695948 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Jun 25 18:06:00.695995 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Jun 25 18:06:00.696003 kernel: Initialise system trusted keyrings Jun 25 18:06:00.696008 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Jun 25 18:06:00.696013 kernel: Key type asymmetric registered Jun 25 18:06:00.696018 kernel: Asymmetric key parser 'x509' registered Jun 25 18:06:00.696025 kernel: alg: self-tests for CTR-KDF (hmac(sha256)) passed Jun 25 18:06:00.696030 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jun 25 18:06:00.696036 kernel: io scheduler mq-deadline registered Jun 25 18:06:00.696041 kernel: io scheduler kyber registered Jun 25 18:06:00.696046 kernel: io scheduler bfq registered Jun 25 18:06:00.696090 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Jun 25 18:06:00.696135 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Jun 25 18:06:00.696179 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Jun 25 18:06:00.696227 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Jun 25 18:06:00.696271 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Jun 25 18:06:00.696315 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Jun 25 18:06:00.696362 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Jun 25 18:06:00.696370 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Jun 25 18:06:00.696375 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Jun 25 18:06:00.696380 kernel: pstore: Registered erst as persistent store backend Jun 25 18:06:00.696389 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jun 25 18:06:00.696395 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jun 25 18:06:00.696419 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jun 25 18:06:00.696425 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jun 25 18:06:00.696430 kernel: hpet_acpi_add: no address or irqs in _CRS Jun 25 18:06:00.696495 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Jun 25 18:06:00.696503 kernel: i8042: PNP: No PS/2 controller found. Jun 25 18:06:00.696542 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Jun 25 18:06:00.696584 kernel: rtc_cmos rtc_cmos: registered as rtc0 Jun 25 18:06:00.696626 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-06-25T18:05:59 UTC (1719338759) Jun 25 18:06:00.696666 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Jun 25 18:06:00.696674 kernel: fail to initialize ptp_kvm Jun 25 18:06:00.696679 kernel: intel_pstate: Intel P-state driver initializing Jun 25 18:06:00.696684 kernel: intel_pstate: Disabling energy efficiency optimization Jun 25 18:06:00.696690 kernel: intel_pstate: HWP enabled Jun 25 18:06:00.696695 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Jun 25 18:06:00.696700 kernel: vesafb: scrolling: redraw Jun 25 18:06:00.696707 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Jun 25 18:06:00.696712 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000007e8f6127, using 768k, total 768k Jun 25 18:06:00.696718 kernel: Console: switching to colour frame buffer device 128x48 Jun 25 18:06:00.696723 kernel: fb0: VESA VGA frame buffer device Jun 25 18:06:00.696728 kernel: NET: Registered PF_INET6 protocol family Jun 25 18:06:00.696734 kernel: Segment Routing with IPv6 Jun 25 18:06:00.696739 kernel: In-situ OAM (IOAM) with IPv6 Jun 25 18:06:00.696744 kernel: NET: Registered PF_PACKET protocol family Jun 25 18:06:00.696749 kernel: Key type dns_resolver registered Jun 25 18:06:00.696754 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xfa Jun 25 18:06:00.696760 kernel: microcode: Microcode Update Driver: v2.2. Jun 25 18:06:00.696766 kernel: IPI shorthand broadcast: enabled Jun 25 18:06:00.696771 kernel: sched_clock: Marking stable (1597231149, 1372575414)->(4438892950, -1469086387) Jun 25 18:06:00.696776 kernel: registered taskstats version 1 Jun 25 18:06:00.696781 kernel: Loading compiled-in X.509 certificates Jun 25 18:06:00.696787 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.1.95-flatcar: c37bb6ef57220bb1c07535cfcaa08c84d806a137' Jun 25 18:06:00.696792 kernel: Key type .fscrypt registered Jun 25 18:06:00.696797 kernel: Key type fscrypt-provisioning registered Jun 25 18:06:00.696802 kernel: pstore: Using crash dump compression: deflate Jun 25 18:06:00.696808 kernel: ima: Allocated hash algorithm: sha1 Jun 25 18:06:00.696814 kernel: ima: No architecture policies found Jun 25 18:06:00.696819 kernel: clk: Disabling unused clocks Jun 25 18:06:00.696824 kernel: Freeing unused kernel image (initmem) memory: 47156K Jun 25 18:06:00.696829 kernel: Write protecting the kernel read-only data: 34816k Jun 25 18:06:00.696834 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jun 25 18:06:00.696839 kernel: Freeing unused kernel image (rodata/data gap) memory: 488K Jun 25 18:06:00.696845 kernel: Run /init as init process Jun 25 18:06:00.696851 kernel: with arguments: Jun 25 18:06:00.696856 kernel: /init Jun 25 18:06:00.696861 kernel: with environment: Jun 25 18:06:00.696866 kernel: HOME=/ Jun 25 18:06:00.696871 kernel: TERM=linux Jun 25 18:06:00.696876 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jun 25 18:06:00.696883 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jun 25 18:06:00.696890 systemd[1]: Detected architecture x86-64. Jun 25 18:06:00.696896 systemd[1]: Running in initrd. Jun 25 18:06:00.696902 systemd[1]: No hostname configured, using default hostname. Jun 25 18:06:00.696907 systemd[1]: Hostname set to . Jun 25 18:06:00.696912 systemd[1]: Initializing machine ID from random generator. Jun 25 18:06:00.696918 systemd[1]: Queued start job for default target initrd.target. Jun 25 18:06:00.696923 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jun 25 18:06:00.696929 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jun 25 18:06:00.696934 systemd[1]: Reached target paths.target - Path Units. Jun 25 18:06:00.696940 systemd[1]: Reached target slices.target - Slice Units. Jun 25 18:06:00.696946 systemd[1]: Reached target swap.target - Swaps. Jun 25 18:06:00.696951 systemd[1]: Reached target timers.target - Timer Units. Jun 25 18:06:00.696956 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket. Jun 25 18:06:00.696962 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jun 25 18:06:00.696967 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Jun 25 18:06:00.696973 systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Jun 25 18:06:00.696979 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Jun 25 18:06:00.696984 kernel: clocksource: Switched to clocksource tsc Jun 25 18:06:00.696990 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Jun 25 18:06:00.696995 systemd[1]: Listening on systemd-journald.socket - Journal Socket. Jun 25 18:06:00.697001 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Jun 25 18:06:00.697006 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jun 25 18:06:00.697012 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jun 25 18:06:00.697017 systemd[1]: Reached target sockets.target - Socket Units. Jun 25 18:06:00.697023 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jun 25 18:06:00.697029 systemd[1]: Finished network-cleanup.service - Network Cleanup. Jun 25 18:06:00.697034 systemd[1]: Starting systemd-fsck-usr.service... Jun 25 18:06:00.697040 systemd[1]: Starting systemd-journald.service - Journal Service... Jun 25 18:06:00.697047 systemd-journald[268]: Journal started Jun 25 18:06:00.697072 systemd-journald[268]: Runtime Journal (/run/log/journal/91f4d2a4ea924692a9c1a64615c41bbe) is 8.0M, max 639.9M, 631.9M free. Jun 25 18:06:00.725388 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jun 25 18:06:00.726267 systemd-modules-load[271]: Inserted module 'overlay' Jun 25 18:06:00.778439 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jun 25 18:06:00.788442 systemd[1]: Starting systemd-vconsole-setup.service - Setup Virtual Console... Jun 25 18:06:00.788459 kernel: Bridge firewalling registered Jun 25 18:06:00.815013 systemd-modules-load[271]: Inserted module 'br_netfilter' Jun 25 18:06:00.854470 systemd[1]: Started systemd-journald.service - Journal Service. Jun 25 18:06:00.854481 kernel: SCSI subsystem initialized Jun 25 18:06:00.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:00.881561 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jun 25 18:06:01.046345 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jun 25 18:06:01.046358 kernel: audit: type=1130 audit(1719338760.880:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.046366 kernel: device-mapper: uevent: version 1.0.3 Jun 25 18:06:01.046373 kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Jun 25 18:06:01.046379 kernel: audit: type=1130 audit(1719338760.998:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:00.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:00.989336 systemd-modules-load[271]: Inserted module 'dm_multipath' Jun 25 18:06:01.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:00.999709 systemd[1]: Finished systemd-fsck-usr.service. Jun 25 18:06:01.161636 kernel: audit: type=1130 audit(1719338761.054:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.161649 kernel: audit: type=1130 audit(1719338761.112:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.055700 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jun 25 18:06:01.201475 kernel: audit: type=1130 audit(1719338761.170:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.113691 systemd[1]: Finished systemd-vconsole-setup.service - Setup Virtual Console. Jun 25 18:06:01.224754 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Jun 25 18:06:01.257707 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jun 25 18:06:01.258165 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jun 25 18:06:01.290506 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Jun 25 18:06:01.307836 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jun 25 18:06:01.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.327319 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jun 25 18:06:01.446951 kernel: audit: type=1130 audit(1719338761.325:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.446965 kernel: audit: type=1130 audit(1719338761.395:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.396677 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jun 25 18:06:01.508803 kernel: audit: type=1130 audit(1719338761.455:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.456700 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jun 25 18:06:01.550510 kernel: audit: type=1130 audit(1719338761.517:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.577774 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Jun 25 18:06:01.576000 audit: BPF prog-id=6 op=LOAD Jun 25 18:06:01.594533 dracut-cmdline[298]: dracut-dracut-053 Jun 25 18:06:01.594533 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jun 25 18:06:01.594533 dracut-cmdline[298]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=05dd62847a393595c8cf7409b58afa2d4045a2186c3cd58722296be6f3bc4fa9 Jun 25 18:06:01.679504 kernel: Loading iSCSI transport class v2.0-870. Jun 25 18:06:01.679520 kernel: iscsi: registered transport (tcp) Jun 25 18:06:01.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.578355 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Jun 25 18:06:01.594269 systemd-resolved[299]: Positive Trust Anchors: Jun 25 18:06:01.742671 kernel: iscsi: registered transport (qla4xxx) Jun 25 18:06:01.742684 kernel: QLogic iSCSI HBA Driver Jun 25 18:06:01.594275 systemd-resolved[299]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jun 25 18:06:01.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:01.594296 systemd-resolved[299]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jun 25 18:06:01.595985 systemd-resolved[299]: Defaulting to hostname 'linux'. Jun 25 18:06:01.605563 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Jun 25 18:06:01.653528 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Jun 25 18:06:01.739864 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Jun 25 18:06:01.870474 kernel: raid6: avx2x4 gen() 37703 MB/s Jun 25 18:06:01.770708 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Jun 25 18:06:01.898427 kernel: raid6: avx2x2 gen() 53373 MB/s Jun 25 18:06:01.939736 kernel: raid6: avx2x1 gen() 45042 MB/s Jun 25 18:06:01.939751 kernel: raid6: using algorithm avx2x2 gen() 53373 MB/s Jun 25 18:06:01.996498 kernel: raid6: .... xor() 32049 MB/s, rmw enabled Jun 25 18:06:01.996515 kernel: raid6: using avx2x2 recovery algorithm Jun 25 18:06:02.037387 kernel: xor: automatically using best checksumming function avx Jun 25 18:06:02.150398 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jun 25 18:06:02.156594 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Jun 25 18:06:02.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:02.166000 audit: BPF prog-id=7 op=LOAD Jun 25 18:06:02.166000 audit: BPF prog-id=8 op=LOAD Jun 25 18:06:02.175721 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jun 25 18:06:02.182920 systemd-udevd[479]: Using default interface naming scheme 'v252'. Jun 25 18:06:02.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:02.187495 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jun 25 18:06:02.240526 dracut-pre-trigger[493]: rd.md=0: removing MD RAID activation Jun 25 18:06:02.214536 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Jun 25 18:06:02.254838 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Jun 25 18:06:02.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:02.282908 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jun 25 18:06:02.334889 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jun 25 18:06:02.375338 kernel: cryptd: max_cpu_qlen set to 1000 Jun 25 18:06:02.375362 kernel: ACPI: bus type USB registered Jun 25 18:06:02.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:02.396086 kernel: usbcore: registered new interface driver usbfs Jun 25 18:06:02.416655 kernel: usbcore: registered new interface driver hub Jun 25 18:06:02.436686 kernel: usbcore: registered new device driver usb Jun 25 18:06:02.455398 kernel: libata version 3.00 loaded. Jun 25 18:06:02.455438 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Jun 25 18:06:02.495184 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Jun 25 18:06:02.547136 kernel: pps pps0: new PPS source ptp0 Jun 25 18:06:02.547237 kernel: igb 0000:03:00.0: added PHC on eth0 Jun 25 18:06:02.645060 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Jun 25 18:06:02.645124 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e5:f6 Jun 25 18:06:02.645189 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Jun 25 18:06:02.645265 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jun 25 18:06:02.651424 kernel: AVX2 version of gcm_enc/dec engaged. Jun 25 18:06:02.651441 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Jun 25 18:06:03.550114 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jun 25 18:06:03.550372 kernel: pps pps1: new PPS source ptp1 Jun 25 18:06:03.550616 kernel: igb 0000:04:00.0: added PHC on eth1 Jun 25 18:06:03.550822 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Jun 25 18:06:03.551028 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e5:f7 Jun 25 18:06:03.551249 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Jun 25 18:06:03.551462 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jun 25 18:06:03.551654 kernel: AES CTR mode by8 optimization enabled Jun 25 18:06:03.551682 kernel: ahci 0000:00:17.0: version 3.0 Jun 25 18:06:03.551867 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jun 25 18:06:03.552072 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Jun 25 18:06:03.552262 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Jun 25 18:06:03.552462 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Jun 25 18:06:03.552658 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Jun 25 18:06:03.552842 kernel: scsi host0: ahci Jun 25 18:06:03.553080 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jun 25 18:06:03.553269 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Jun 25 18:06:03.553472 kernel: scsi host1: ahci Jun 25 18:06:03.553673 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Jun 25 18:06:03.553858 kernel: scsi host2: ahci Jun 25 18:06:03.554081 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Jun 25 18:06:03.554268 kernel: scsi host3: ahci Jun 25 18:06:03.554487 kernel: hub 1-0:1.0: USB hub found Jun 25 18:06:03.554704 kernel: scsi host4: ahci Jun 25 18:06:03.554919 kernel: hub 1-0:1.0: 16 ports detected Jun 25 18:06:03.555137 kernel: scsi host5: ahci Jun 25 18:06:03.555332 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Jun 25 18:06:03.555539 kernel: hub 2-0:1.0: USB hub found Jun 25 18:06:03.555716 kernel: scsi host6: ahci Jun 25 18:06:03.555767 kernel: hub 2-0:1.0: 10 ports detected Jun 25 18:06:03.555818 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 137 Jun 25 18:06:03.555826 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 137 Jun 25 18:06:03.555832 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 137 Jun 25 18:06:03.555840 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Jun 25 18:06:03.555938 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 137 Jun 25 18:06:03.555945 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 137 Jun 25 18:06:03.555952 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 137 Jun 25 18:06:03.555958 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 137 Jun 25 18:06:03.555964 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Jun 25 18:06:03.556021 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jun 25 18:06:03.556073 kernel: hub 1-14:1.0: USB hub found Jun 25 18:06:03.556134 kernel: hub 1-14:1.0: 4 ports detected Jun 25 18:06:03.556190 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jun 25 18:06:03.556242 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Jun 25 18:06:04.169938 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jun 25 18:06:04.170006 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jun 25 18:06:04.170014 kernel: ata3: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:04.170021 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jun 25 18:06:04.170027 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:04.170037 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:04.170043 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:04.170049 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Jun 25 18:06:04.170151 kernel: ata7: SATA link down (SStatus 0 SControl 300) Jun 25 18:06:04.170159 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Jun 25 18:06:04.170165 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Jun 25 18:06:04.170172 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jun 25 18:06:04.170178 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jun 25 18:06:04.170186 kernel: ata2.00: Features: NCQ-prio Jun 25 18:06:04.170192 kernel: ata1.00: Features: NCQ-prio Jun 25 18:06:04.170199 kernel: hid: raw HID events driver (C) Jiri Kosina Jun 25 18:06:04.170205 kernel: ata2.00: configured for UDMA/133 Jun 25 18:06:04.170212 kernel: ata1.00: configured for UDMA/133 Jun 25 18:06:04.170218 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Jun 25 18:06:04.362229 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Jun 25 18:06:04.362291 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Jun 25 18:06:04.485459 kernel: port_module: 10 callbacks suppressed Jun 25 18:06:04.485486 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Jun 25 18:06:04.485603 kernel: usbcore: registered new interface driver usbhid Jun 25 18:06:04.485617 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jun 25 18:06:04.485710 kernel: usbhid: USB HID core driver Jun 25 18:06:04.485723 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Jun 25 18:06:04.485735 kernel: ata1.00: Enabling discard_zeroes_data Jun 25 18:06:04.485749 kernel: ata2.00: Enabling discard_zeroes_data Jun 25 18:06:04.485762 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jun 25 18:06:04.485852 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jun 25 18:06:04.485940 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Jun 25 18:06:04.486043 kernel: sd 0:0:0:0: [sda] Write Protect is off Jun 25 18:06:04.486143 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Jun 25 18:06:04.486250 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Jun 25 18:06:04.486353 kernel: sd 1:0:0:0: [sdb] Write Protect is off Jun 25 18:06:04.486464 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Jun 25 18:06:04.486579 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Jun 25 18:06:04.486590 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Jun 25 18:06:04.486679 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jun 25 18:06:04.486736 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Jun 25 18:06:04.486806 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jun 25 18:06:04.486863 kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes Jun 25 18:06:04.486950 kernel: sd 1:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Jun 25 18:06:04.487063 kernel: ata1.00: Enabling discard_zeroes_data Jun 25 18:06:04.487070 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jun 25 18:06:04.487129 kernel: ata2.00: Enabling discard_zeroes_data Jun 25 18:06:04.487157 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jun 25 18:06:04.487248 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jun 25 18:06:04.487261 kernel: GPT:9289727 != 937703087 Jun 25 18:06:04.487274 kernel: GPT:Alternate GPT header not at the end of the disk. Jun 25 18:06:04.487286 kernel: GPT:9289727 != 937703087 Jun 25 18:06:04.487295 kernel: GPT: Use GNU Parted to correct GPT errors. Jun 25 18:06:04.487301 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Jun 25 18:06:04.487308 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Jun 25 18:06:04.512442 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Jun 25 18:06:04.543319 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Micron_5300_MTFDDAK480TDT ROOT. Jun 25 18:06:04.608653 kernel: BTRFS: device fsid dda7891e-deba-495b-b677-4df6bea75326 devid 1 transid 33 /dev/sdb3 scanned by (udev-worker) (557) Jun 25 18:06:04.608670 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (550) Jun 25 18:06:04.608680 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Jun 25 18:06:04.590330 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device - Micron_5300_MTFDDAK480TDT EFI-SYSTEM. Jun 25 18:06:04.623357 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Micron_5300_MTFDDAK480TDT USR-A. Jun 25 18:06:04.654582 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Micron_5300_MTFDDAK480TDT USR-A. Jun 25 18:06:04.669776 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5300_MTFDDAK480TDT OEM. Jun 25 18:06:04.702843 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary... Jun 25 18:06:04.728617 disk-uuid[688]: Primary Header is updated. Jun 25 18:06:04.728617 disk-uuid[688]: Secondary Entries is updated. Jun 25 18:06:04.728617 disk-uuid[688]: Secondary Header is updated. Jun 25 18:06:04.800459 kernel: ata2.00: Enabling discard_zeroes_data Jun 25 18:06:04.800473 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Jun 25 18:06:04.800480 kernel: ata2.00: Enabling discard_zeroes_data Jun 25 18:06:04.800487 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Jun 25 18:06:05.787237 kernel: ata2.00: Enabling discard_zeroes_data Jun 25 18:06:05.806429 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Jun 25 18:06:05.807021 disk-uuid[689]: The operation has completed successfully. Jun 25 18:06:05.845806 systemd[1]: disk-uuid.service: Deactivated successfully. Jun 25 18:06:05.952516 kernel: audit: type=1130 audit(1719338765.854:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:05.952533 kernel: audit: type=1131 audit(1719338765.854:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:05.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:05.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:05.845852 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary. Jun 25 18:06:05.991598 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jun 25 18:06:05.948809 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr... Jun 25 18:06:06.002595 sh[703]: Success Jun 25 18:06:06.086752 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr. Jun 25 18:06:06.109194 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr... Jun 25 18:06:06.118047 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr. Jun 25 18:06:06.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.190441 kernel: audit: type=1130 audit(1719338766.134:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.190469 kernel: BTRFS info (device dm-0): first mount of filesystem dda7891e-deba-495b-b677-4df6bea75326 Jun 25 18:06:06.219735 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm Jun 25 18:06:06.242562 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead Jun 25 18:06:06.262946 kernel: BTRFS info (device dm-0): disabling log replay at mount time Jun 25 18:06:06.282463 kernel: BTRFS info (device dm-0): using free space tree Jun 25 18:06:06.324387 kernel: BTRFS info (device dm-0): enabling ssd optimizations Jun 25 18:06:06.326912 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr. Jun 25 18:06:06.336707 systemd[1]: afterburn-network-kargs.service - Afterburn Initrd Setup Network Kernel Arguments was skipped because no trigger condition checks were met. Jun 25 18:06:06.345731 systemd[1]: Starting ignition-setup.service - Ignition (setup)... Jun 25 18:06:06.463532 kernel: BTRFS info (device sdb6): first mount of filesystem fd3f89f8-bb38-42cc-8bba-aac6f22f18e8 Jun 25 18:06:06.463547 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Jun 25 18:06:06.463554 kernel: BTRFS info (device sdb6): using free space tree Jun 25 18:06:06.463561 kernel: BTRFS info (device sdb6): enabling ssd optimizations Jun 25 18:06:06.463568 kernel: BTRFS info (device sdb6): last unmount of filesystem fd3f89f8-bb38-42cc-8bba-aac6f22f18e8 Jun 25 18:06:06.355069 systemd[1]: Starting parse-ip-for-networkd.service - Write systemd-networkd units from cmdline... Jun 25 18:06:06.529358 kernel: audit: type=1130 audit(1719338766.481:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.443623 systemd[1]: Finished parse-ip-for-networkd.service - Write systemd-networkd units from cmdline. Jun 25 18:06:06.571488 kernel: audit: type=1130 audit(1719338766.539:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.482992 systemd[1]: Finished ignition-setup.service - Ignition (setup). Jun 25 18:06:06.588567 systemd[1]: Starting ignition-fetch-offline.service - Ignition (fetch-offline)... Jun 25 18:06:06.614000 audit: BPF prog-id=9 op=LOAD Jun 25 18:06:06.644439 kernel: audit: type=1334 audit(1719338766.614:25): prog-id=9 op=LOAD Jun 25 18:06:06.654623 systemd[1]: Starting systemd-networkd.service - Network Configuration... Jun 25 18:06:06.662021 unknown[885]: fetched base config from "system" Jun 25 18:06:06.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.656661 ignition[885]: Ignition 2.15.0 Jun 25 18:06:06.791530 kernel: audit: type=1130 audit(1719338766.681:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.791544 kernel: audit: type=1130 audit(1719338766.739:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.662033 unknown[885]: fetched user config from "system" Jun 25 18:06:06.656668 ignition[885]: Stage: fetch-offline Jun 25 18:06:06.663198 systemd[1]: Finished ignition-fetch-offline.service - Ignition (fetch-offline). Jun 25 18:06:06.656700 ignition[885]: no configs at "/usr/lib/ignition/base.d" Jun 25 18:06:06.921208 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jun 25 18:06:06.921297 kernel: audit: type=1130 audit(1719338766.846:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.921306 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Jun 25 18:06:06.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.676439 systemd-networkd[894]: lo: Link UP Jun 25 18:06:06.656708 ignition[885]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jun 25 18:06:06.676442 systemd-networkd[894]: lo: Gained carrier Jun 25 18:06:06.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.656787 ignition[885]: parsed url from cmdline: "" Jun 25 18:06:06.960549 iscsid[927]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jun 25 18:06:06.960549 iscsid[927]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jun 25 18:06:06.960549 iscsid[927]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jun 25 18:06:06.960549 iscsid[927]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jun 25 18:06:06.960549 iscsid[927]: If using hardware iscsi like qla4xxx this message can be ignored. Jun 25 18:06:06.960549 iscsid[927]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jun 25 18:06:06.960549 iscsid[927]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jun 25 18:06:07.121611 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Jun 25 18:06:07.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.676913 systemd-networkd[894]: Enumeration completed Jun 25 18:06:07.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:06.656790 ignition[885]: no config URL provided Jun 25 18:06:06.677759 systemd-networkd[894]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Jun 25 18:06:06.656795 ignition[885]: reading system config file "/usr/lib/ignition/user.ign" Jun 25 18:06:06.682645 systemd[1]: Started systemd-networkd.service - Network Configuration. Jun 25 18:06:06.656817 ignition[885]: parsing config with SHA512: 06150068883ac6c2aa78cdf861dde16f5872365416b0c5607d242af75babe3a8e96aab6cc0eea7b638ca922269b983eb040d5134ae8b82dd6a3986995e8f5c97 Jun 25 18:06:06.740637 systemd[1]: Reached target network.target - Network. Jun 25 18:06:06.662234 ignition[885]: fetch-offline: fetch-offline passed Jun 25 18:06:06.800669 systemd[1]: ignition-fetch.service - Ignition (fetch) was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jun 25 18:06:06.662238 ignition[885]: POST message to Packet Timeline Jun 25 18:06:06.806677 systemd[1]: Starting ignition-kargs.service - Ignition (kargs)... Jun 25 18:06:06.662242 ignition[885]: POST Status error: resource requires networking Jun 25 18:06:06.807962 systemd[1]: Starting iscsiuio.service - iSCSI UserSpace I/O driver... Jun 25 18:06:06.662304 ignition[885]: Ignition finished successfully Jun 25 18:06:06.821667 systemd[1]: Started iscsiuio.service - iSCSI UserSpace I/O driver. Jun 25 18:06:06.813916 ignition[914]: Ignition 2.15.0 Jun 25 18:06:06.848825 systemd[1]: Starting iscsid.service - Open-iSCSI... Jun 25 18:06:06.813920 ignition[914]: Stage: kargs Jun 25 18:06:06.849517 systemd-networkd[894]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Jun 25 18:06:06.813981 ignition[914]: no configs at "/usr/lib/ignition/base.d" Jun 25 18:06:06.928637 systemd[1]: Started iscsid.service - Open-iSCSI. Jun 25 18:06:06.813987 ignition[914]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jun 25 18:06:06.964534 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Jun 25 18:06:06.814396 ignition[914]: kargs: kargs passed Jun 25 18:06:06.984659 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Jun 25 18:06:06.814399 ignition[914]: POST message to Packet Timeline Jun 25 18:06:07.021951 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Jun 25 18:06:06.814433 ignition[914]: GET https://metadata.packet.net/metadata: attempt #1 Jun 25 18:06:07.060564 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jun 25 18:06:06.814917 ignition[914]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33316->[::1]:53: read: connection refused Jun 25 18:06:07.060604 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jun 25 18:06:07.015444 ignition[914]: GET https://metadata.packet.net/metadata: attempt #2 Jun 25 18:06:07.100610 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Jun 25 18:06:07.016451 ignition[914]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:34203->[::1]:53: read: connection refused Jun 25 18:06:07.101751 systemd-networkd[894]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Jun 25 18:06:07.417219 ignition[914]: GET https://metadata.packet.net/metadata: attempt #3 Jun 25 18:06:07.111038 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Jun 25 18:06:07.418208 ignition[914]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44656->[::1]:53: read: connection refused Jun 25 18:06:07.130626 systemd-networkd[894]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Jun 25 18:06:07.160003 systemd-networkd[894]: enp1s0f1np1: Link UP Jun 25 18:06:07.160361 systemd-networkd[894]: enp1s0f1np1: Gained carrier Jun 25 18:06:07.171942 systemd-networkd[894]: enp1s0f0np0: Link UP Jun 25 18:06:07.172364 systemd-networkd[894]: eno2: Link UP Jun 25 18:06:07.172789 systemd-networkd[894]: eno1: Link UP Jun 25 18:06:07.899938 systemd-networkd[894]: enp1s0f0np0: Gained carrier Jun 25 18:06:07.909629 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Jun 25 18:06:07.948588 systemd-networkd[894]: enp1s0f0np0: DHCPv4 address 136.144.54.115/31, gateway 136.144.54.114 acquired from 145.40.83.140 Jun 25 18:06:08.133990 systemd-networkd[894]: enp1s0f1np1: Gained IPv6LL Jun 25 18:06:08.218747 ignition[914]: GET https://metadata.packet.net/metadata: attempt #4 Jun 25 18:06:08.219778 ignition[914]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48707->[::1]:53: read: connection refused Jun 25 18:06:08.965964 systemd-networkd[894]: enp1s0f0np0: Gained IPv6LL Jun 25 18:06:09.820588 ignition[914]: GET https://metadata.packet.net/metadata: attempt #5 Jun 25 18:06:09.821695 ignition[914]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58974->[::1]:53: read: connection refused Jun 25 18:06:13.024281 ignition[914]: GET https://metadata.packet.net/metadata: attempt #6 Jun 25 18:06:13.057798 ignition[914]: GET result: OK Jun 25 18:06:13.250309 ignition[914]: Ignition finished successfully Jun 25 18:06:13.252026 systemd[1]: Finished ignition-kargs.service - Ignition (kargs). Jun 25 18:06:13.283528 kernel: kauditd_printk_skb: 3 callbacks suppressed Jun 25 18:06:13.283542 kernel: audit: type=1130 audit(1719338773.268:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:13.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:13.349728 systemd[1]: Starting ignition-disks.service - Ignition (disks)... Jun 25 18:06:13.355697 ignition[945]: Ignition 2.15.0 Jun 25 18:06:13.355701 ignition[945]: Stage: disks Jun 25 18:06:13.355764 ignition[945]: no configs at "/usr/lib/ignition/base.d" Jun 25 18:06:13.355770 ignition[945]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jun 25 18:06:13.356177 ignition[945]: disks: disks passed Jun 25 18:06:13.356180 ignition[945]: POST message to Packet Timeline Jun 25 18:06:13.356191 ignition[945]: GET https://metadata.packet.net/metadata: attempt #1 Jun 25 18:06:13.381178 ignition[945]: GET result: OK Jun 25 18:06:13.591664 ignition[945]: Ignition finished successfully Jun 25 18:06:13.594752 systemd[1]: Finished ignition-disks.service - Ignition (disks). Jun 25 18:06:13.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:13.610027 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Jun 25 18:06:13.693604 kernel: audit: type=1130 audit(1719338773.608:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:13.673598 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Jun 25 18:06:13.673710 systemd[1]: Reached target local-fs.target - Local File Systems. Jun 25 18:06:13.693733 systemd[1]: Reached target sysinit.target - System Initialization. Jun 25 18:06:13.722601 systemd[1]: Reached target basic.target - Basic System. Jun 25 18:06:13.748798 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT... Jun 25 18:06:13.777611 systemd-fsck[963]: ROOT: clean, 14/553520 files, 52654/553472 blocks Jun 25 18:06:13.790442 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT. Jun 25 18:06:13.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:13.862509 kernel: audit: type=1130 audit(1719338773.799:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:13.868616 systemd[1]: Mounting sysroot.mount - /sysroot... Jun 25 18:06:13.950446 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Quota mode: none. Jun 25 18:06:13.950898 systemd[1]: Mounted sysroot.mount - /sysroot. Jun 25 18:06:13.960718 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Jun 25 18:06:13.981514 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Jun 25 18:06:14.111067 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (970) Jun 25 18:06:14.111079 kernel: BTRFS info (device sdb6): first mount of filesystem fd3f89f8-bb38-42cc-8bba-aac6f22f18e8 Jun 25 18:06:14.111086 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Jun 25 18:06:14.111093 kernel: BTRFS info (device sdb6): using free space tree Jun 25 18:06:14.111099 kernel: BTRFS info (device sdb6): enabling ssd optimizations Jun 25 18:06:14.015370 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr... Jun 25 18:06:14.125579 systemd[1]: Starting flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent... Jun 25 18:06:14.138938 systemd[1]: Starting flatcar-static-network.service - Flatcar Static Network Agent... Jun 25 18:06:14.158467 systemd[1]: ignition-remount-sysroot.service - Remount /sysroot read-write for Ignition was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jun 25 18:06:14.196636 coreos-metadata[990]: Jun 25 18:06:14.183 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jun 25 18:06:14.158575 systemd[1]: Reached target ignition-diskful.target - Ignition Boot Disk Setup. Jun 25 18:06:14.237661 coreos-metadata[989]: Jun 25 18:06:14.184 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jun 25 18:06:14.237661 coreos-metadata[989]: Jun 25 18:06:14.206 INFO Fetch successful Jun 25 18:06:14.237661 coreos-metadata[989]: Jun 25 18:06:14.227 INFO wrote hostname ci-3815.2.4-a-d2be0afd41 to /sysroot/etc/hostname Jun 25 18:06:14.435479 kernel: audit: type=1130 audit(1719338774.246:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.435495 kernel: audit: type=1131 audit(1719338774.246:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.435502 kernel: audit: type=1130 audit(1719338774.366:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.435569 coreos-metadata[990]: Jun 25 18:06:14.204 INFO Fetch successful Jun 25 18:06:14.179817 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Jun 25 18:06:14.205530 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr. Jun 25 18:06:14.226675 systemd[1]: flatcar-static-network.service: Deactivated successfully. Jun 25 18:06:14.481506 initrd-setup-root[1002]: cut: /sysroot/etc/passwd: No such file or directory Jun 25 18:06:14.226720 systemd[1]: Finished flatcar-static-network.service - Flatcar Static Network Agent. Jun 25 18:06:14.502523 initrd-setup-root[1009]: cut: /sysroot/etc/group: No such file or directory Jun 25 18:06:14.248317 systemd[1]: Finished flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent. Jun 25 18:06:14.523658 initrd-setup-root[1016]: cut: /sysroot/etc/shadow: No such file or directory Jun 25 18:06:14.432796 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup... Jun 25 18:06:14.543642 initrd-setup-root[1023]: cut: /sysroot/etc/gshadow: No such file or directory Jun 25 18:06:14.657457 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup. Jun 25 18:06:14.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.724595 kernel: audit: type=1130 audit(1719338774.666:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.733695 systemd[1]: Starting ignition-mount.service - Ignition (mount)... Jun 25 18:06:14.772428 kernel: BTRFS info (device sdb6): last unmount of filesystem fd3f89f8-bb38-42cc-8bba-aac6f22f18e8 Jun 25 18:06:14.752830 systemd[1]: Starting sysroot-boot.service - /sysroot/boot... Jun 25 18:06:14.781362 systemd[1]: sysroot-oem.mount: Deactivated successfully. Jun 25 18:06:14.802836 systemd[1]: Finished sysroot-boot.service - /sysroot/boot. Jun 25 18:06:14.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:14.842570 ignition[1121]: INFO : Ignition 2.15.0 Jun 25 18:06:14.842570 ignition[1121]: INFO : Stage: mount Jun 25 18:06:14.842570 ignition[1121]: INFO : no configs at "/usr/lib/ignition/base.d" Jun 25 18:06:14.842570 ignition[1121]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jun 25 18:06:14.842570 ignition[1121]: INFO : mount: mount passed Jun 25 18:06:14.842570 ignition[1121]: INFO : POST message to Packet Timeline Jun 25 18:06:14.842570 ignition[1121]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jun 25 18:06:14.842570 ignition[1121]: INFO : GET result: OK Jun 25 18:06:14.937550 kernel: audit: type=1130 audit(1719338774.812:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.022012 ignition[1121]: INFO : Ignition finished successfully Jun 25 18:06:15.024842 systemd[1]: Finished ignition-mount.service - Ignition (mount). Jun 25 18:06:15.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.109537 kernel: audit: type=1130 audit(1719338775.040:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.120693 systemd[1]: Starting ignition-files.service - Ignition (files)... Jun 25 18:06:15.131424 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Jun 25 18:06:15.185467 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1136) Jun 25 18:06:15.185480 kernel: BTRFS info (device sdb6): first mount of filesystem fd3f89f8-bb38-42cc-8bba-aac6f22f18e8 Jun 25 18:06:15.204758 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Jun 25 18:06:15.228484 kernel: BTRFS info (device sdb6): using free space tree Jun 25 18:06:15.273387 kernel: BTRFS info (device sdb6): enabling ssd optimizations Jun 25 18:06:15.274478 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Jun 25 18:06:15.298832 ignition[1154]: INFO : Ignition 2.15.0 Jun 25 18:06:15.298832 ignition[1154]: INFO : Stage: files Jun 25 18:06:15.313503 ignition[1154]: INFO : no configs at "/usr/lib/ignition/base.d" Jun 25 18:06:15.313503 ignition[1154]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jun 25 18:06:15.313503 ignition[1154]: DEBUG : files: compiled without relabeling support, skipping Jun 25 18:06:15.313503 ignition[1154]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jun 25 18:06:15.313503 ignition[1154]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(4): [started] processing unit "etcd-member.service" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(4): op(5): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(4): op(5): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(4): [finished] processing unit "etcd-member.service" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(6): [started] processing unit "flannel-docker-opts.service" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(6): op(7): [started] writing systemd drop-in "retry.conf" at "/sysroot/etc/systemd/system/flannel-docker-opts.service.d/retry.conf" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(6): op(7): [finished] writing systemd drop-in "retry.conf" at "/sysroot/etc/systemd/system/flannel-docker-opts.service.d/retry.conf" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(6): [finished] processing unit "flannel-docker-opts.service" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(8): [started] processing unit "docker.service" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(8): [finished] processing unit "docker.service" Jun 25 18:06:15.313503 ignition[1154]: INFO : files: op(9): [started] processing unit "flanneld.service" Jun 25 18:06:15.302054 unknown[1154]: wrote ssh authorized keys file for user: core Jun 25 18:06:15.615659 ignition[1154]: INFO : files: op(9): op(a): [started] writing systemd drop-in "50-network-config.conf" at "/sysroot/etc/systemd/system/flanneld.service.d/50-network-config.conf" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: op(9): op(a): [finished] writing systemd drop-in "50-network-config.conf" at "/sysroot/etc/systemd/system/flanneld.service.d/50-network-config.conf" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: op(9): [finished] processing unit "flanneld.service" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: op(b): [started] setting preset to enabled for "docker.service" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: op(b): [finished] setting preset to enabled for "docker.service" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: op(c): [started] setting preset to enabled for "etcd-member.service" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: op(c): [finished] setting preset to enabled for "etcd-member.service" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: op(d): [started] setting preset to enabled for "flanneld.service" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: op(d): [finished] setting preset to enabled for "flanneld.service" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: createResultFile: createFiles: op(e): [started] writing file "/sysroot/etc/.ignition-result.json" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: createResultFile: createFiles: op(e): [finished] writing file "/sysroot/etc/.ignition-result.json" Jun 25 18:06:15.615659 ignition[1154]: INFO : files: files passed Jun 25 18:06:15.615659 ignition[1154]: INFO : POST message to Packet Timeline Jun 25 18:06:15.615659 ignition[1154]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jun 25 18:06:15.615659 ignition[1154]: INFO : GET result: OK Jun 25 18:06:15.907581 kernel: audit: type=1130 audit(1719338775.682:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.670506 systemd[1]: Finished ignition-files.service - Ignition (files). Jun 25 18:06:15.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.925702 ignition[1154]: INFO : Ignition finished successfully Jun 25 18:06:15.748593 systemd[1]: Starting ignition-quench.service - Ignition (record completion)... Jun 25 18:06:15.782615 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion... Jun 25 18:06:15.807756 systemd[1]: ignition-quench.service: Deactivated successfully. Jun 25 18:06:15.993880 initrd-setup-root-after-ignition[1188]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jun 25 18:06:15.993880 initrd-setup-root-after-ignition[1188]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory Jun 25 18:06:16.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.807827 systemd[1]: Finished ignition-quench.service - Ignition (record completion). Jun 25 18:06:16.042921 initrd-setup-root-after-ignition[1192]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jun 25 18:06:15.823001 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion. Jun 25 18:06:15.858081 systemd[1]: Reached target ignition-complete.target - Ignition Complete. Jun 25 18:06:15.889956 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root... Jun 25 18:06:15.900850 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jun 25 18:06:15.900898 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root. Jun 25 18:06:16.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:15.917631 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Jun 25 18:06:15.935606 systemd[1]: Reached target initrd.target - Initrd Default Target. Jun 25 18:06:15.953697 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met. Jun 25 18:06:15.967930 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Jun 25 18:06:16.003602 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jun 25 18:06:16.041903 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Jun 25 18:06:16.057129 systemd[1]: Stopped target nss-lookup.target - Host and Network Name Lookups. Jun 25 18:06:16.088795 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Jun 25 18:06:16.108994 systemd[1]: Stopped target timers.target - Timer Units. Jun 25 18:06:16.129081 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jun 25 18:06:16.129486 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jun 25 18:06:16.148421 systemd[1]: Stopped target initrd.target - Initrd Default Target. Jun 25 18:06:16.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.170093 systemd[1]: Stopped target basic.target - Basic System. Jun 25 18:06:16.189085 systemd[1]: Stopped target ignition-complete.target - Ignition Complete. Jun 25 18:06:16.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.209097 systemd[1]: Stopped target ignition-diskful.target - Ignition Boot Disk Setup. Jun 25 18:06:16.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.232066 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Jun 25 18:06:16.253107 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Jun 25 18:06:16.275087 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Jun 25 18:06:16.297112 systemd[1]: Stopped target sysinit.target - System Initialization. Jun 25 18:06:16.317114 systemd[1]: Stopped target local-fs.target - Local File Systems. Jun 25 18:06:16.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.337095 systemd[1]: Stopped target local-fs-pre.target - Preparation for Local File Systems. Jun 25 18:06:16.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.355070 systemd[1]: Stopped target swap.target - Swaps. Jun 25 18:06:16.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.371976 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jun 25 18:06:16.372351 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Jun 25 18:06:16.628600 iscsid[927]: iscsid shutting down. Jun 25 18:06:16.393326 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Jun 25 18:06:16.652491 ignition[1207]: INFO : Ignition 2.15.0 Jun 25 18:06:16.652491 ignition[1207]: INFO : Stage: umount Jun 25 18:06:16.652491 ignition[1207]: INFO : no configs at "/usr/lib/ignition/base.d" Jun 25 18:06:16.652491 ignition[1207]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jun 25 18:06:16.652491 ignition[1207]: INFO : umount: umount passed Jun 25 18:06:16.652491 ignition[1207]: INFO : POST message to Packet Timeline Jun 25 18:06:16.652491 ignition[1207]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jun 25 18:06:16.652491 ignition[1207]: INFO : GET result: OK Jun 25 18:06:16.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.412978 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jun 25 18:06:16.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.413348 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Jun 25 18:06:16.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.431219 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jun 25 18:06:16.431609 systemd[1]: Stopped ignition-fetch-offline.service - Ignition (fetch-offline). Jun 25 18:06:16.451302 systemd[1]: Stopped target paths.target - Path Units. Jun 25 18:06:16.872643 ignition[1207]: INFO : Ignition finished successfully Jun 25 18:06:16.469959 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jun 25 18:06:16.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.470425 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jun 25 18:06:16.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.491098 systemd[1]: Stopped target slices.target - Slice Units. Jun 25 18:06:16.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.946000 audit: BPF prog-id=6 op=UNLOAD Jun 25 18:06:16.511072 systemd[1]: Stopped target sockets.target - Socket Units. Jun 25 18:06:16.532071 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jun 25 18:06:16.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.532500 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion. Jun 25 18:06:17.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.553189 systemd[1]: ignition-files.service: Deactivated successfully. Jun 25 18:06:17.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.553580 systemd[1]: Stopped ignition-files.service - Ignition (files). Jun 25 18:06:17.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.573185 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jun 25 18:06:16.573586 systemd[1]: Stopped flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent. Jun 25 18:06:16.604128 systemd[1]: Stopping ignition-mount.service - Ignition (mount)... Jun 25 18:06:17.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.610775 systemd[1]: Stopping iscsid.service - Open-iSCSI... Jun 25 18:06:17.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.647762 systemd[1]: Stopping sysroot-boot.service - /sysroot/boot... Jun 25 18:06:17.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.660599 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jun 25 18:06:17.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.660774 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Jun 25 18:06:16.682849 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jun 25 18:06:17.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.682979 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Jun 25 18:06:16.696276 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jun 25 18:06:16.697365 systemd[1]: iscsid.service: Deactivated successfully. Jun 25 18:06:16.697519 systemd[1]: Stopped iscsid.service - Open-iSCSI. Jun 25 18:06:17.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.722131 systemd[1]: sysroot-boot.service: Deactivated successfully. Jun 25 18:06:17.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.722373 systemd[1]: Stopped sysroot-boot.service - /sysroot/boot. Jun 25 18:06:17.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.737869 systemd[1]: iscsid.socket: Deactivated successfully. Jun 25 18:06:16.738142 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket. Jun 25 18:06:16.746070 systemd[1]: Stopping iscsiuio.service - iSCSI UserSpace I/O driver... Jun 25 18:06:16.764267 systemd[1]: iscsiuio.service: Deactivated successfully. Jun 25 18:06:16.764545 systemd[1]: Stopped iscsiuio.service - iSCSI UserSpace I/O driver. Jun 25 18:06:17.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.788603 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jun 25 18:06:17.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.788844 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Jun 25 18:06:17.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.808064 systemd[1]: Stopped target network.target - Network. Jun 25 18:06:17.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:17.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.823764 systemd[1]: iscsiuio.socket: Deactivated successfully. Jun 25 18:06:16.823878 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jun 25 18:06:16.845153 systemd[1]: Stopping systemd-networkd.service - Network Configuration... Jun 25 18:06:16.853570 systemd-networkd[894]: enp1s0f1np1: DHCPv6 lease lost Jun 25 18:06:17.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:16.861652 systemd-networkd[894]: enp1s0f0np0: DHCPv6 lease lost Jun 25 18:06:17.483000 audit: BPF prog-id=9 op=UNLOAD Jun 25 18:06:16.864873 systemd[1]: Stopping systemd-resolved.service - Network Name Resolution... Jun 25 18:06:16.884227 systemd[1]: systemd-resolved.service: Deactivated successfully. Jun 25 18:06:16.884515 systemd[1]: Stopped systemd-resolved.service - Network Name Resolution. Jun 25 18:06:16.903406 systemd[1]: systemd-networkd.service: Deactivated successfully. Jun 25 18:06:16.903663 systemd[1]: Stopped systemd-networkd.service - Network Configuration. Jun 25 18:06:16.924259 systemd[1]: ignition-mount.service: Deactivated successfully. Jun 25 18:06:16.924509 systemd[1]: Stopped ignition-mount.service - Ignition (mount). Jun 25 18:06:16.948117 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jun 25 18:06:17.582412 systemd-journald[268]: Received SIGTERM from PID 1 (systemd). Jun 25 18:06:16.948216 systemd[1]: Closed systemd-networkd.socket - Network Service Netlink Socket. Jun 25 18:06:16.967691 systemd[1]: ignition-disks.service: Deactivated successfully. Jun 25 18:06:16.967843 systemd[1]: Stopped ignition-disks.service - Ignition (disks). Jun 25 18:06:16.986783 systemd[1]: ignition-kargs.service: Deactivated successfully. Jun 25 18:06:16.986938 systemd[1]: Stopped ignition-kargs.service - Ignition (kargs). Jun 25 18:06:17.006816 systemd[1]: ignition-setup.service: Deactivated successfully. Jun 25 18:06:17.006964 systemd[1]: Stopped ignition-setup.service - Ignition (setup). Jun 25 18:06:17.027831 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jun 25 18:06:17.027991 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup. Jun 25 18:06:17.058816 systemd[1]: Stopping network-cleanup.service - Network Cleanup... Jun 25 18:06:17.075620 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jun 25 18:06:17.075801 systemd[1]: Stopped parse-ip-for-networkd.service - Write systemd-networkd units from cmdline. Jun 25 18:06:17.097868 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jun 25 18:06:17.098023 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Jun 25 18:06:17.118143 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jun 25 18:06:17.118294 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Jun 25 18:06:17.137824 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jun 25 18:06:17.137990 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jun 25 18:06:17.158379 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Jun 25 18:06:17.181012 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Jun 25 18:06:17.181248 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jun 25 18:06:17.183074 systemd[1]: systemd-udevd.service: Deactivated successfully. Jun 25 18:06:17.183452 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Jun 25 18:06:17.211407 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jun 25 18:06:17.211549 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Jun 25 18:06:17.230713 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jun 25 18:06:17.230823 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Jun 25 18:06:17.249662 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jun 25 18:06:17.249798 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Jun 25 18:06:17.268802 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jun 25 18:06:17.268952 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Jun 25 18:06:17.286772 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jun 25 18:06:17.286942 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jun 25 18:06:17.327873 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Jun 25 18:06:17.341623 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jun 25 18:06:17.341725 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jun 25 18:06:17.368622 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jun 25 18:06:17.368656 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Jun 25 18:06:17.388566 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jun 25 18:06:17.388704 systemd[1]: Stopped systemd-vconsole-setup.service - Setup Virtual Console. Jun 25 18:06:17.409216 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jun 25 18:06:17.410842 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jun 25 18:06:17.411066 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Jun 25 18:06:17.456354 systemd[1]: network-cleanup.service: Deactivated successfully. Jun 25 18:06:17.456631 systemd[1]: Stopped network-cleanup.service - Network Cleanup. Jun 25 18:06:17.476173 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Jun 25 18:06:17.505875 systemd[1]: Starting initrd-switch-root.service - Switch Root... Jun 25 18:06:17.533228 systemd[1]: Switching root. Jun 25 18:06:17.583421 systemd-journald[268]: Journal stopped Jun 25 18:06:20.275120 kernel: SELinux: Permission cmd in class io_uring not defined in policy. Jun 25 18:06:20.275141 kernel: SELinux: the above unknown classes and permissions will be allowed Jun 25 18:06:20.275153 kernel: SELinux: policy capability network_peer_controls=1 Jun 25 18:06:20.275165 kernel: SELinux: policy capability open_perms=1 Jun 25 18:06:20.275174 kernel: SELinux: policy capability extended_socket_class=1 Jun 25 18:06:20.275183 kernel: SELinux: policy capability always_check_network=0 Jun 25 18:06:20.275193 kernel: SELinux: policy capability cgroup_seclabel=1 Jun 25 18:06:20.275206 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jun 25 18:06:20.275215 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jun 25 18:06:20.275224 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jun 25 18:06:20.275234 systemd[1]: Successfully loaded SELinux policy in 257.287ms. Jun 25 18:06:20.275248 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.838ms. Jun 25 18:06:20.275259 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jun 25 18:06:20.275269 systemd[1]: Detected architecture x86-64. Jun 25 18:06:20.275280 systemd[1]: Detected first boot. Jun 25 18:06:20.275292 systemd[1]: Hostname set to . Jun 25 18:06:20.275303 systemd[1]: Initializing machine ID from random generator. Jun 25 18:06:20.275313 systemd[1]: Populated /etc with preset unit settings. Jun 25 18:06:20.275323 kernel: kauditd_printk_skb: 48 callbacks suppressed Jun 25 18:06:20.275333 kernel: audit: type=1334 audit(1719338778.431:90): prog-id=12 op=LOAD Jun 25 18:06:20.275343 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jun 25 18:06:20.275353 kernel: audit: type=1334 audit(1719338778.431:91): prog-id=3 op=UNLOAD Jun 25 18:06:20.275365 systemd[1]: Stopped initrd-switch-root.service - Switch Root. Jun 25 18:06:20.275375 kernel: audit: type=1334 audit(1719338778.431:92): prog-id=13 op=LOAD Jun 25 18:06:20.275390 kernel: audit: type=1334 audit(1719338778.431:93): prog-id=14 op=LOAD Jun 25 18:06:20.275400 kernel: audit: type=1334 audit(1719338778.431:94): prog-id=4 op=UNLOAD Jun 25 18:06:20.275409 kernel: audit: type=1334 audit(1719338778.431:95): prog-id=5 op=UNLOAD Jun 25 18:06:20.275419 kernel: audit: type=1334 audit(1719338778.431:96): prog-id=15 op=LOAD Jun 25 18:06:20.275428 kernel: audit: type=1334 audit(1719338778.431:97): prog-id=12 op=UNLOAD Jun 25 18:06:20.275437 kernel: audit: type=1334 audit(1719338778.431:98): prog-id=16 op=LOAD Jun 25 18:06:20.275449 kernel: audit: type=1334 audit(1719338778.431:99): prog-id=17 op=LOAD Jun 25 18:06:20.275459 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jun 25 18:06:20.275470 systemd[1]: Created slice system-addon\x2dconfig.slice - Slice /system/addon-config. Jun 25 18:06:20.275480 systemd[1]: Created slice system-addon\x2drun.slice - Slice /system/addon-run. Jun 25 18:06:20.275491 systemd[1]: Created slice system-getty.slice - Slice /system/getty. Jun 25 18:06:20.275502 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Jun 25 18:06:20.275512 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Jun 25 18:06:20.275524 systemd[1]: Created slice system-system\x2dcloudinit.slice - Slice /system/system-cloudinit. Jun 25 18:06:20.275535 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Jun 25 18:06:20.275545 systemd[1]: Created slice user.slice - User and Session Slice. Jun 25 18:06:20.275559 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jun 25 18:06:20.275571 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Jun 25 18:06:20.275582 systemd[1]: Set up automount boot.automount - Boot partition Automount Point. Jun 25 18:06:20.275593 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Jun 25 18:06:20.275604 systemd[1]: Stopped target initrd-switch-root.target - Switch Root. Jun 25 18:06:20.275615 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems. Jun 25 18:06:20.275627 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System. Jun 25 18:06:20.275638 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Jun 25 18:06:20.275649 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jun 25 18:06:20.275660 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jun 25 18:06:20.275670 systemd[1]: Reached target slices.target - Slice Units. Jun 25 18:06:20.275681 systemd[1]: Reached target swap.target - Swaps. Jun 25 18:06:20.275692 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Jun 25 18:06:20.275705 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket. Jun 25 18:06:20.275716 systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Jun 25 18:06:20.275726 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Jun 25 18:06:20.275737 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jun 25 18:06:20.275748 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jun 25 18:06:20.275759 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket. Jun 25 18:06:20.275770 systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Jun 25 18:06:20.275781 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Jun 25 18:06:20.275794 systemd[1]: Mounting media.mount - External Media Directory... Jun 25 18:06:20.275806 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:20.275817 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Jun 25 18:06:20.275829 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Jun 25 18:06:20.275840 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... Jun 25 18:06:20.275853 systemd[1]: Starting flatcar-tmpfiles.service - Create missing system files... Jun 25 18:06:20.275864 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jun 25 18:06:20.275876 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jun 25 18:06:20.275887 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Jun 25 18:06:20.275969 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jun 25 18:06:20.275980 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jun 25 18:06:20.275991 kernel: ACPI: bus type drm_connector registered Jun 25 18:06:20.276002 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jun 25 18:06:20.276015 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Jun 25 18:06:20.276027 kernel: fuse: init (API version 7.37) Jun 25 18:06:20.276037 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jun 25 18:06:20.276048 kernel: loop: module loaded Jun 25 18:06:20.276059 systemd[1]: setup-nsswitch.service - Create /etc/nsswitch.conf was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jun 25 18:06:20.276070 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jun 25 18:06:20.276081 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device. Jun 25 18:06:20.276092 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jun 25 18:06:20.276103 systemd[1]: Stopped systemd-fsck-usr.service. Jun 25 18:06:20.276116 systemd[1]: Stopped systemd-journald.service - Journal Service. Jun 25 18:06:20.276127 systemd[1]: systemd-journald.service: Consumed 1.158s CPU time. Jun 25 18:06:20.276139 systemd[1]: Starting systemd-journald.service - Journal Service... Jun 25 18:06:20.276153 systemd-journald[1346]: Journal started Jun 25 18:06:20.276194 systemd-journald[1346]: Runtime Journal (/run/log/journal/0104a42ad8d34c5faac7d53adc3489e6) is 8.0M, max 639.9M, 631.9M free. Jun 25 18:06:17.860000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jun 25 18:06:18.114000 audit: BPF prog-id=10 op=LOAD Jun 25 18:06:18.114000 audit: BPF prog-id=10 op=UNLOAD Jun 25 18:06:18.114000 audit: BPF prog-id=11 op=LOAD Jun 25 18:06:18.114000 audit: BPF prog-id=11 op=UNLOAD Jun 25 18:06:18.431000 audit: BPF prog-id=12 op=LOAD Jun 25 18:06:18.431000 audit: BPF prog-id=3 op=UNLOAD Jun 25 18:06:18.431000 audit: BPF prog-id=13 op=LOAD Jun 25 18:06:18.431000 audit: BPF prog-id=14 op=LOAD Jun 25 18:06:18.431000 audit: BPF prog-id=4 op=UNLOAD Jun 25 18:06:18.431000 audit: BPF prog-id=5 op=UNLOAD Jun 25 18:06:18.431000 audit: BPF prog-id=15 op=LOAD Jun 25 18:06:18.431000 audit: BPF prog-id=12 op=UNLOAD Jun 25 18:06:18.431000 audit: BPF prog-id=16 op=LOAD Jun 25 18:06:18.431000 audit: BPF prog-id=17 op=LOAD Jun 25 18:06:18.431000 audit: BPF prog-id=13 op=UNLOAD Jun 25 18:06:18.431000 audit: BPF prog-id=14 op=UNLOAD Jun 25 18:06:18.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:18.645000 audit: BPF prog-id=15 op=UNLOAD Jun 25 18:06:18.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:18.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.245000 audit: BPF prog-id=18 op=LOAD Jun 25 18:06:20.246000 audit: BPF prog-id=19 op=LOAD Jun 25 18:06:20.246000 audit: BPF prog-id=20 op=LOAD Jun 25 18:06:20.246000 audit: BPF prog-id=16 op=UNLOAD Jun 25 18:06:20.246000 audit: BPF prog-id=17 op=UNLOAD Jun 25 18:06:20.270000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jun 25 18:06:20.270000 audit[1346]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff3f2d9c20 a2=4000 a3=7fff3f2d9cbc items=0 ppid=1 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:20.270000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jun 25 18:06:18.422903 systemd[1]: Queued start job for default target multi-user.target. Jun 25 18:06:18.422910 systemd[1]: Unnecessary job was removed for dev-sdb6.device - /dev/sdb6. Jun 25 18:06:18.433483 systemd[1]: systemd-journald.service: Deactivated successfully. Jun 25 18:06:18.433626 systemd[1]: systemd-journald.service: Consumed 1.158s CPU time. Jun 25 18:06:20.312543 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jun 25 18:06:20.345591 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Jun 25 18:06:20.376413 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Jun 25 18:06:20.418438 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jun 25 18:06:20.451194 systemd[1]: verity-setup.service: Deactivated successfully. Jun 25 18:06:20.451213 systemd[1]: Stopped verity-setup.service. Jun 25 18:06:20.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.512434 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:20.532589 systemd[1]: Started systemd-journald.service - Journal Service. Jun 25 18:06:20.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.542920 systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Jun 25 18:06:20.552664 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Jun 25 18:06:20.562657 systemd[1]: Mounted media.mount - External Media Directory. Jun 25 18:06:20.572633 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Jun 25 18:06:20.582608 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Jun 25 18:06:20.592613 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp. Jun 25 18:06:20.600713 systemd[1]: Finished flatcar-tmpfiles.service - Create missing system files. Jun 25 18:06:20.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.610843 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jun 25 18:06:20.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.620865 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jun 25 18:06:20.621038 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Jun 25 18:06:20.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.631049 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jun 25 18:06:20.631306 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jun 25 18:06:20.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.641301 systemd[1]: modprobe@drm.service: Deactivated successfully. Jun 25 18:06:20.641696 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jun 25 18:06:20.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.652304 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jun 25 18:06:20.652676 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jun 25 18:06:20.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.663327 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jun 25 18:06:20.663707 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Jun 25 18:06:20.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.674295 systemd[1]: modprobe@loop.service: Deactivated successfully. Jun 25 18:06:20.674681 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jun 25 18:06:20.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.685308 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jun 25 18:06:20.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.696330 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Jun 25 18:06:20.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.707254 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Jun 25 18:06:20.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.717288 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jun 25 18:06:20.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.728860 systemd[1]: Reached target network-pre.target - Preparation for Network. Jun 25 18:06:20.754880 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Jun 25 18:06:20.765326 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Jun 25 18:06:20.775593 systemd[1]: remount-root.service - Remount Root File System was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jun 25 18:06:20.776661 systemd[1]: Starting systemd-hwdb-update.service - Rebuild Hardware Database... Jun 25 18:06:20.793557 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Jun 25 18:06:20.797433 systemd-journald[1346]: Time spent on flushing to /var/log/journal/0104a42ad8d34c5faac7d53adc3489e6 is 15.767ms for 1533 entries. Jun 25 18:06:20.797433 systemd-journald[1346]: System Journal (/var/log/journal/0104a42ad8d34c5faac7d53adc3489e6) is 8.0M, max 195.6M, 187.6M free. Jun 25 18:06:20.841334 systemd-journald[1346]: Received client request to flush runtime journal. Jun 25 18:06:20.811495 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jun 25 18:06:20.812357 systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Jun 25 18:06:20.827516 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jun 25 18:06:20.828195 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jun 25 18:06:20.838143 systemd[1]: Starting systemd-sysusers.service - Create System Users... Jun 25 18:06:20.848161 systemd[1]: Starting systemd-udev-settle.service - Wait for udev To Complete Device Initialization... Jun 25 18:06:20.858578 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Jun 25 18:06:20.868532 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Jun 25 18:06:20.878593 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Jun 25 18:06:20.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.889601 systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Jun 25 18:06:20.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.899585 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jun 25 18:06:20.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.909584 systemd[1]: Finished systemd-sysusers.service - Create System Users. Jun 25 18:06:20.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.920599 systemd[1]: Reached target first-boot-complete.target - First Boot Complete. Jun 25 18:06:20.942604 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jun 25 18:06:20.953508 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jun 25 18:06:20.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:20.964728 udevadm[1362]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jun 25 18:06:21.148594 systemd[1]: Finished systemd-hwdb-update.service - Rebuild Hardware Database. Jun 25 18:06:21.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.158000 audit: BPF prog-id=21 op=LOAD Jun 25 18:06:21.158000 audit: BPF prog-id=22 op=LOAD Jun 25 18:06:21.158000 audit: BPF prog-id=7 op=UNLOAD Jun 25 18:06:21.158000 audit: BPF prog-id=8 op=UNLOAD Jun 25 18:06:21.173749 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jun 25 18:06:21.184737 systemd-udevd[1366]: Using default interface naming scheme 'v252'. Jun 25 18:06:21.197928 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jun 25 18:06:21.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.209851 systemd[1]: Condition check resulted in dev-ttyS1.device - /dev/ttyS1 being skipped. Jun 25 18:06:21.209000 audit: BPF prog-id=23 op=LOAD Jun 25 18:06:21.218550 systemd[1]: Starting systemd-networkd.service - Network Configuration... Jun 25 18:06:21.232957 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Jun 25 18:06:21.233016 kernel: BTRFS info: devid 1 device path /dev/mapper/usr changed to /dev/dm-0 scanned by (udev-worker) (1377) Jun 25 18:06:21.233029 kernel: ACPI: button: Sleep Button [SLPB] Jun 25 18:06:21.233043 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 33 scanned by (udev-worker) (1385) Jun 25 18:06:21.237393 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Jun 25 18:06:21.326392 kernel: mousedev: PS/2 mouse device common for all mice Jun 25 18:06:21.326465 kernel: ACPI: button: Power Button [PWRF] Jun 25 18:06:21.401394 kernel: IPMI message handler: version 39.2 Jun 25 18:06:21.401455 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Jun 25 18:06:21.461476 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Jun 25 18:06:21.461623 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Jun 25 18:06:21.460000 audit: BPF prog-id=24 op=LOAD Jun 25 18:06:21.460000 audit: BPF prog-id=25 op=LOAD Jun 25 18:06:21.460000 audit: BPF prog-id=26 op=LOAD Jun 25 18:06:21.403471 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5300_MTFDDAK480TDT OEM. Jun 25 18:06:21.473832 systemd[1]: Starting systemd-userdbd.service - User Database Manager... Jun 25 18:06:21.483389 kernel: ipmi device interface Jun 25 18:06:21.483426 kernel: iTCO_vendor_support: vendor-support=0 Jun 25 18:06:21.494620 systemd[1]: Started systemd-userdbd.service - User Database Manager. Jun 25 18:06:21.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.547395 kernel: ipmi_si: IPMI System Interface driver Jun 25 18:06:21.547455 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Jun 25 18:06:21.553418 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Jun 25 18:06:21.560035 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Jun 25 18:06:21.560129 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Jun 25 18:06:21.560145 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Jun 25 18:06:21.560158 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Jun 25 18:06:21.705423 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Jun 25 18:06:21.705540 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Jun 25 18:06:21.705607 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Jun 25 18:06:21.712124 kernel: ipmi_si: Adding ACPI-specified kcs state machine Jun 25 18:06:21.712144 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Jun 25 18:06:21.712208 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Jun 25 18:06:21.689638 systemd-networkd[1412]: bond0: netdev ready Jun 25 18:06:21.693184 systemd-networkd[1412]: lo: Link UP Jun 25 18:06:21.693186 systemd-networkd[1412]: lo: Gained carrier Jun 25 18:06:21.693706 systemd-networkd[1412]: Enumeration completed Jun 25 18:06:21.693793 systemd[1]: Started systemd-networkd.service - Network Configuration. Jun 25 18:06:21.694040 systemd-networkd[1412]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Jun 25 18:06:21.699718 systemd-networkd[1412]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:5c:1a:9d.network. Jun 25 18:06:21.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:21.829543 kernel: intel_rapl_common: Found RAPL domain package Jun 25 18:06:21.829578 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Jun 25 18:06:21.829676 kernel: intel_rapl_common: Found RAPL domain core Jun 25 18:06:21.830546 systemd[1]: Starting systemd-networkd-wait-online.service - Wait for Network to be Configured... Jun 25 18:06:21.852435 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Jun 25 18:06:21.852523 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jun 25 18:06:21.855386 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Jun 25 18:06:21.855577 systemd-networkd[1412]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:5c:1a:9c.network. Jun 25 18:06:21.869610 kernel: intel_rapl_common: Found RAPL domain dram Jun 25 18:06:21.907387 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jun 25 18:06:21.957205 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Jun 25 18:06:22.009387 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Jun 25 18:06:22.032387 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Jun 25 18:06:22.032419 kernel: ipmi_ssif: IPMI SSIF Interface driver Jun 25 18:06:22.037425 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Jun 25 18:06:22.068388 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jun 25 18:06:22.090086 systemd-networkd[1412]: bond0: Link UP Jun 25 18:06:22.090286 systemd-networkd[1412]: enp1s0f1np1: Link UP Jun 25 18:06:22.090429 systemd-networkd[1412]: enp1s0f1np1: Gained carrier Jun 25 18:06:22.091398 systemd-networkd[1412]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:5c:1a:9c.network. Jun 25 18:06:22.110388 systemd[1]: Finished systemd-udev-settle.service - Wait for udev To Complete Device Initialization. Jun 25 18:06:22.130387 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.152387 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.174388 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.175591 systemd[1]: Starting lvm2-activation-early.service - Activation of LVM2 logical volumes... Jun 25 18:06:22.181821 lvm[1477]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jun 25 18:06:22.196388 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.217389 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.238454 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.243980 systemd[1]: Finished lvm2-activation-early.service - Activation of LVM2 logical volumes. Jun 25 18:06:22.258417 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.276548 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jun 25 18:06:22.279451 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.300385 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.303443 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.336386 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.337573 systemd[1]: Starting lvm2-activation.service - Activation of LVM2 logical volumes... Jun 25 18:06:22.339755 lvm[1478]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jun 25 18:06:22.355440 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.374451 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.391428 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.397903 systemd[1]: Finished lvm2-activation.service - Activation of LVM2 logical volumes. Jun 25 18:06:22.409417 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.425544 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Jun 25 18:06:22.428420 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.444499 systemd[1]: var-lib-machines.mount - Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jun 25 18:06:22.444517 systemd[1]: Reached target local-fs.target - Local File Systems. Jun 25 18:06:22.446440 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.462492 systemd[1]: Reached target machines.target - Containers. Jun 25 18:06:22.464418 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.482435 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.483442 systemd-networkd[1412]: enp1s0f0np0: Link UP Jun 25 18:06:22.483631 systemd-networkd[1412]: bond0: Gained carrier Jun 25 18:06:22.483726 systemd-networkd[1412]: enp1s0f0np0: Gained carrier Jun 25 18:06:22.507285 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Jun 25 18:06:22.507307 kernel: bond0: (slave enp1s0f1np1): link status definitely down, disabling slave Jun 25 18:06:22.524255 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jun 25 18:06:22.533586 systemd[1]: Starting ldconfig.service - Rebuild Dynamic Linker Cache... Jun 25 18:06:22.552338 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jun 25 18:06:22.552365 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:22.553091 systemd[1]: Starting systemd-boot-update.service - Automatic Boot Loader Update... Jun 25 18:06:22.555434 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Jun 25 18:06:22.555459 kernel: bond0: active interface up! Jun 25 18:06:22.563807 systemd-networkd[1412]: enp1s0f1np1: Link DOWN Jun 25 18:06:22.563810 systemd-networkd[1412]: enp1s0f1np1: Lost carrier Jun 25 18:06:22.575101 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM... Jun 25 18:06:22.585171 systemd[1]: Starting systemd-machine-id-commit.service - Commit a transient machine-id on disk... Jun 25 18:06:22.586070 systemd[1]: Starting systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/... Jun 25 18:06:22.586286 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1481 (bootctl) Jun 25 18:06:22.587100 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service - File System Check on /dev/disk/by-label/EFI-SYSTEM... Jun 25 18:06:22.606389 kernel: loop0: detected capacity change from 0 to 80584 Jun 25 18:06:22.609288 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jun 25 18:06:22.609701 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM. Jun 25 18:06:22.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.609850 systemd[1]: Finished systemd-machine-id-commit.service - Commit a transient machine-id on disk. Jun 25 18:06:22.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.641429 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jun 25 18:06:22.715405 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jun 25 18:06:22.718965 systemd-networkd[1412]: enp1s0f1np1: Link UP Jun 25 18:06:22.718973 systemd-networkd[1412]: enp1s0f1np1: Gained carrier Jun 25 18:06:22.727563 systemd-fsck[1490]: fsck.fat 4.2 (2021-01-31) Jun 25 18:06:22.727563 systemd-fsck[1490]: /dev/sdb1: 808 files, 120378/258078 clusters Jun 25 18:06:22.729445 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service - File System Check on /dev/disk/by-label/EFI-SYSTEM. Jun 25 18:06:22.737400 kernel: loop1: detected capacity change from 0 to 139360 Jun 25 18:06:22.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.763558 systemd[1]: Mounting boot.mount - Boot partition... Jun 25 18:06:22.778428 systemd[1]: Mounted boot.mount - Boot partition. Jun 25 18:06:22.790437 kernel: bond0: (slave enp1s0f1np1): link status up, enabling it in 200 ms Jun 25 18:06:22.790570 kernel: bond0: (slave enp1s0f1np1): invalid new link 3 on slave Jun 25 18:06:22.832210 systemd[1]: Finished systemd-boot-update.service - Automatic Boot Loader Update. Jun 25 18:06:22.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.851401 kernel: loop2: detected capacity change from 0 to 8 Jun 25 18:06:22.913420 kernel: loop3: detected capacity change from 0 to 80584 Jun 25 18:06:22.924767 ldconfig[1480]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jun 25 18:06:22.925658 systemd[1]: Finished ldconfig.service - Rebuild Dynamic Linker Cache. Jun 25 18:06:22.933402 kernel: loop4: detected capacity change from 0 to 139360 Jun 25 18:06:22.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.958106 (sd-sysext)[1495]: Using extensions 'containerd-flatcar', 'docker-flatcar', 'oem-packet'. Jun 25 18:06:22.958306 (sd-sysext)[1495]: Merged extensions into '/usr'. Jun 25 18:06:22.958388 kernel: loop5: detected capacity change from 0 to 8 Jun 25 18:06:22.959163 systemd[1]: Finished systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/. Jun 25 18:06:22.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:22.979587 systemd[1]: Starting ensure-sysext.service... Jun 25 18:06:22.987130 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Jun 25 18:06:22.992757 systemd-tmpfiles[1497]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jun 25 18:06:22.993575 systemd-tmpfiles[1497]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jun 25 18:06:22.993774 systemd-tmpfiles[1497]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Jun 25 18:06:22.994261 systemd-tmpfiles[1497]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jun 25 18:06:23.002534 systemd[1]: Reloading. Jun 25 18:06:23.015441 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Jun 25 18:06:23.091692 systemd[1]: /usr/lib/systemd/system/docker.socket:6: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jun 25 18:06:23.145000 audit: BPF prog-id=27 op=LOAD Jun 25 18:06:23.145000 audit: BPF prog-id=24 op=UNLOAD Jun 25 18:06:23.145000 audit: BPF prog-id=28 op=LOAD Jun 25 18:06:23.145000 audit: BPF prog-id=29 op=LOAD Jun 25 18:06:23.145000 audit: BPF prog-id=25 op=UNLOAD Jun 25 18:06:23.145000 audit: BPF prog-id=26 op=UNLOAD Jun 25 18:06:23.146000 audit: BPF prog-id=30 op=LOAD Jun 25 18:06:23.146000 audit: BPF prog-id=31 op=LOAD Jun 25 18:06:23.146000 audit: BPF prog-id=21 op=UNLOAD Jun 25 18:06:23.146000 audit: BPF prog-id=22 op=UNLOAD Jun 25 18:06:23.146000 audit: BPF prog-id=32 op=LOAD Jun 25 18:06:23.146000 audit: BPF prog-id=23 op=UNLOAD Jun 25 18:06:23.146000 audit: BPF prog-id=33 op=LOAD Jun 25 18:06:23.146000 audit: BPF prog-id=18 op=UNLOAD Jun 25 18:06:23.147000 audit: BPF prog-id=34 op=LOAD Jun 25 18:06:23.147000 audit: BPF prog-id=35 op=LOAD Jun 25 18:06:23.147000 audit: BPF prog-id=19 op=UNLOAD Jun 25 18:06:23.147000 audit: BPF prog-id=20 op=UNLOAD Jun 25 18:06:23.149468 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jun 25 18:06:23.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:23.161587 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Jun 25 18:06:23.172566 systemd[1]: Starting clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs... Jun 25 18:06:23.177000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jun 25 18:06:23.177000 audit[1589]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3793d8e0 a2=420 a3=0 items=0 ppid=1573 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:23.177000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jun 25 18:06:23.179500 augenrules[1589]: No rules Jun 25 18:06:23.184314 systemd[1]: Starting systemd-journal-catalog-update.service - Rebuild Journal Catalog... Jun 25 18:06:23.195578 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Jun 25 18:06:23.207518 systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Jun 25 18:06:23.219230 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Jun 25 18:06:23.228790 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Jun 25 18:06:23.239603 systemd[1]: Finished clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs. Jun 25 18:06:23.250600 systemd[1]: Finished systemd-journal-catalog-update.service - Rebuild Journal Catalog. Jun 25 18:06:23.269646 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Jun 25 18:06:23.280116 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.280287 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jun 25 18:06:23.281077 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jun 25 18:06:23.297607 systemd-resolved[1595]: Positive Trust Anchors: Jun 25 18:06:23.297614 systemd-resolved[1595]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jun 25 18:06:23.297635 systemd-resolved[1595]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jun 25 18:06:23.299691 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jun 25 18:06:23.300310 systemd-resolved[1595]: Using system hostname 'ci-3815.2.4-a-d2be0afd41'. Jun 25 18:06:23.310235 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jun 25 18:06:23.320521 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jun 25 18:06:23.320619 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:23.321452 systemd[1]: Starting systemd-update-done.service - Update is Completed... Jun 25 18:06:23.330471 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jun 25 18:06:23.330573 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.331188 systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Jun 25 18:06:23.340762 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Jun 25 18:06:23.350841 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jun 25 18:06:23.350990 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jun 25 18:06:23.360673 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jun 25 18:06:23.360764 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jun 25 18:06:23.370672 systemd[1]: modprobe@loop.service: Deactivated successfully. Jun 25 18:06:23.370759 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jun 25 18:06:23.380662 systemd[1]: Finished systemd-update-done.service - Update is Completed. Jun 25 18:06:23.391804 systemd[1]: Reached target network.target - Network. Jun 25 18:06:23.399520 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Jun 25 18:06:23.409520 systemd[1]: Reached target time-set.target - System Time Set. Jun 25 18:06:23.419504 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.419704 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jun 25 18:06:23.434595 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jun 25 18:06:23.445130 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jun 25 18:06:23.455134 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jun 25 18:06:23.465227 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jun 25 18:06:23.474565 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jun 25 18:06:23.474661 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:23.474754 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jun 25 18:06:23.474833 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jun 25 18:06:23.475591 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jun 25 18:06:23.475676 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jun 25 18:06:23.485709 systemd[1]: modprobe@drm.service: Deactivated successfully. Jun 25 18:06:23.485793 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jun 25 18:06:23.493527 systemd-networkd[1412]: bond0: Gained IPv6LL Jun 25 18:06:23.495707 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jun 25 18:06:23.495792 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jun 25 18:06:23.505698 systemd[1]: modprobe@loop.service: Deactivated successfully. Jun 25 18:06:23.505782 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jun 25 18:06:23.515760 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jun 25 18:06:23.515840 systemd[1]: Reached target sysinit.target - System Initialization. Jun 25 18:06:23.526517 systemd[1]: Started motdgen.path - Watch for update engine configuration changes. Jun 25 18:06:23.536505 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path - Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jun 25 18:06:23.546539 systemd[1]: Started logrotate.timer - Daily rotation of log files. Jun 25 18:06:23.556521 systemd[1]: Started mdadm.timer - Weekly check for MD array's redundancy information.. Jun 25 18:06:23.566464 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Jun 25 18:06:23.576592 systemd[1]: update-engine-stub.timer - Update Engine Stub Timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jun 25 18:06:23.576609 systemd[1]: Reached target paths.target - Path Units. Jun 25 18:06:23.584469 systemd[1]: Reached target timers.target - Timer Units. Jun 25 18:06:23.592739 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Jun 25 18:06:23.603030 systemd[1]: Starting docker.socket - Docker Socket for the API... Jun 25 18:06:23.612822 systemd[1]: Listening on sshd.socket - OpenSSH Server Socket. Jun 25 18:06:23.622530 systemd[1]: systemd-pcrphase-sysinit.service - TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:23.622561 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jun 25 18:06:23.622878 systemd[1]: Finished ensure-sysext.service. Jun 25 18:06:23.631564 systemd[1]: Listening on docker.socket - Docker Socket for the API. Jun 25 18:06:23.641908 systemd[1]: Reached target sockets.target - Socket Units. Jun 25 18:06:23.650473 systemd[1]: Reached target basic.target - Basic System. Jun 25 18:06:23.658508 systemd[1]: addon-config@oem.service - Configure Addon /oem was skipped because no trigger condition checks were met. Jun 25 18:06:23.658522 systemd[1]: addon-run@oem.service - Run Addon /oem was skipped because no trigger condition checks were met. Jun 25 18:06:23.666684 systemd[1]: Starting containerd.service - containerd container runtime... Jun 25 18:06:23.678294 systemd[1]: Starting coreos-metadata.service - Flatcar Metadata Agent... Jun 25 18:06:23.688107 systemd[1]: Starting dbus.service - D-Bus System Message Bus... Jun 25 18:06:23.697144 systemd[1]: Starting enable-oem-cloudinit.service - Enable cloudinit... Jun 25 18:06:23.699446 jq[1615]: false Jun 25 18:06:23.699704 dbus-daemon[1614]: [system] SELinux support is enabled Jun 25 18:06:23.707125 systemd[1]: Starting extend-filesystems.service - Extend Filesystems... Jun 25 18:06:23.710523 coreos-metadata[1611]: Jun 25 18:06:23.710 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jun 25 18:06:23.714487 extend-filesystems[1616]: Found loop3 Jun 25 18:06:23.728583 extend-filesystems[1616]: Found loop4 Jun 25 18:06:23.728583 extend-filesystems[1616]: Found loop5 Jun 25 18:06:23.728583 extend-filesystems[1616]: Found sda Jun 25 18:06:23.728583 extend-filesystems[1616]: Found sdb Jun 25 18:06:23.728583 extend-filesystems[1616]: Found sdb1 Jun 25 18:06:23.728583 extend-filesystems[1616]: Found sdb2 Jun 25 18:06:23.728583 extend-filesystems[1616]: Found sdb3 Jun 25 18:06:23.728583 extend-filesystems[1616]: Found usr Jun 25 18:06:23.728583 extend-filesystems[1616]: Found sdb4 Jun 25 18:06:23.728583 extend-filesystems[1616]: Found sdb6 Jun 25 18:06:23.728583 extend-filesystems[1616]: Found sdb7 Jun 25 18:06:23.728583 extend-filesystems[1616]: Found sdb9 Jun 25 18:06:23.728583 extend-filesystems[1616]: Checking size of /dev/sdb9 Jun 25 18:06:23.728583 extend-filesystems[1616]: Resized partition /dev/sdb9 Jun 25 18:06:23.914437 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Jun 25 18:06:23.914463 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 33 scanned by (udev-worker) (1445) Jun 25 18:06:23.716594 systemd[1]: flatcar-setup-environment.service - Modifies /etc/environment for CoreOS was skipped because of an unmet condition check (ConditionPathExists=/oem/bin/flatcar-setup-environment). Jun 25 18:06:23.914595 extend-filesystems[1625]: resize2fs 1.47.0 (5-Feb-2023) Jun 25 18:06:23.717298 systemd[1]: Starting motdgen.service - Generate /run/flatcar/motd... Jun 25 18:06:23.774556 systemd[1]: Starting ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline... Jun 25 18:06:23.785180 systemd[1]: Starting sshd-keygen.service - Generate sshd host keys... Jun 25 18:06:23.793750 systemd[1]: Starting systemd-logind.service - User Login Management... Jun 25 18:06:23.931835 update_engine[1641]: I0625 18:06:23.842964 1641 main.cc:92] Flatcar Update Engine starting Jun 25 18:06:23.931835 update_engine[1641]: I0625 18:06:23.843808 1641 update_check_scheduler.cc:74] Next update check in 10m11s Jun 25 18:06:23.815327 systemd-logind[1639]: Watching system buttons on /dev/input/event3 (Power Button) Jun 25 18:06:23.932158 jq[1642]: true Jun 25 18:06:23.815338 systemd-logind[1639]: Watching system buttons on /dev/input/event2 (Sleep Button) Jun 25 18:06:23.815348 systemd-logind[1639]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Jun 25 18:06:23.815661 systemd-logind[1639]: New seat seat0. Jun 25 18:06:23.820491 systemd[1]: systemd-pcrphase.service - TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jun 25 18:06:23.830470 systemd[1]: Starting tcsd.service - TCG Core Services Daemon... Jun 25 18:06:23.835744 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jun 25 18:06:23.836294 systemd[1]: Starting update-engine.service - Update Engine... Jun 25 18:06:23.862504 systemd[1]: Starting update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition... Jun 25 18:06:23.883745 systemd[1]: Started dbus.service - D-Bus System Message Bus. Jun 25 18:06:23.906808 systemd[1]: Finished systemd-networkd-wait-online.service - Wait for Network to be Configured. Jun 25 18:06:23.931740 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jun 25 18:06:23.931837 systemd[1]: Condition check resulted in enable-oem-cloudinit.service - Enable cloudinit being skipped. Jun 25 18:06:23.932027 systemd[1]: motdgen.service: Deactivated successfully. Jun 25 18:06:23.932113 systemd[1]: Finished motdgen.service - Generate /run/flatcar/motd. Jun 25 18:06:23.941645 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jun 25 18:06:23.941728 systemd[1]: Finished ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline. Jun 25 18:06:23.953807 jq[1644]: true Jun 25 18:06:23.955347 dbus-daemon[1614]: [system] Successfully activated service 'org.freedesktop.systemd1' Jun 25 18:06:23.960957 systemd[1]: Started update-engine.service - Update Engine. Jun 25 18:06:23.970666 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Jun 25 18:06:23.970760 systemd[1]: Condition check resulted in tcsd.service - TCG Core Services Daemon being skipped. Jun 25 18:06:23.972641 systemd[1]: Started systemd-logind.service - User Login Management. Jun 25 18:06:23.983208 systemd[1]: Reached target network-online.target - Network is Online. Jun 25 18:06:23.999909 bash[1663]: Updated "/home/core/.ssh/authorized_keys" Jun 25 18:06:24.010696 systemd[1]: Starting nvidia.service - NVIDIA Configure Service... Jun 25 18:06:24.019485 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service - Load cloud-config from /usr/share/oem/cloud-config.yml was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jun 25 18:06:24.019590 systemd[1]: Reached target system-config.target - Load system-provided cloud configs. Jun 25 18:06:24.029569 systemd[1]: user-cloudinit-proc-cmdline.service - Load cloud-config from url defined in /proc/cmdline was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jun 25 18:06:24.029646 systemd[1]: Reached target user-config.target - Load user-provided cloud configs. Jun 25 18:06:24.040528 systemd[1]: Started locksmithd.service - Cluster reboot manager. Jun 25 18:06:24.052296 systemd[1]: Finished update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition. Jun 25 18:06:24.064964 locksmithd[1676]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jun 25 18:06:24.067781 systemd[1]: Finished nvidia.service - NVIDIA Configure Service. Jun 25 18:06:24.071422 kernel: mlx5_core 0000:01:00.0: lag map: port 1:1 port 2:2 Jun 25 18:06:24.071595 kernel: mlx5_core 0000:01:00.0: shared_fdb:0 mode:queue_affinity Jun 25 18:06:24.094140 containerd[1645]: time="2024-06-25T18:06:24.094096375Z" level=info msg="starting containerd" revision=99b8088b873ba42b788f29ccd0dc26ebb6952f1e version=v1.7.13 Jun 25 18:06:24.110400 containerd[1645]: time="2024-06-25T18:06:24.110349111Z" level=info msg="loading plugin \"io.containerd.warning.v1.deprecations\"..." type=io.containerd.warning.v1 Jun 25 18:06:24.110400 containerd[1645]: time="2024-06-25T18:06:24.110368593Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111166 containerd[1645]: time="2024-06-25T18:06:24.111122274Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/6.1.95-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111166 containerd[1645]: time="2024-06-25T18:06:24.111137970Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111262 containerd[1645]: time="2024-06-25T18:06:24.111251545Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111262 containerd[1645]: time="2024-06-25T18:06:24.111261477Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jun 25 18:06:24.111312 containerd[1645]: time="2024-06-25T18:06:24.111305042Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111342 containerd[1645]: time="2024-06-25T18:06:24.111334239Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." error="no scratch file generator: skip plugin" type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111360 containerd[1645]: time="2024-06-25T18:06:24.111342131Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111406 containerd[1645]: time="2024-06-25T18:06:24.111376578Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111529 containerd[1645]: time="2024-06-25T18:06:24.111492036Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111529 containerd[1645]: time="2024-06-25T18:06:24.111502420Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jun 25 18:06:24.111529 containerd[1645]: time="2024-06-25T18:06:24.111508175Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111594 containerd[1645]: time="2024-06-25T18:06:24.111566228Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jun 25 18:06:24.111594 containerd[1645]: time="2024-06-25T18:06:24.111574325Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jun 25 18:06:24.111626 containerd[1645]: time="2024-06-25T18:06:24.111602044Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jun 25 18:06:24.111626 containerd[1645]: time="2024-06-25T18:06:24.111608602Z" level=info msg="metadata content store policy set" policy=shared Jun 25 18:06:24.112697 systemd[1]: Starting sshkeys.service... Jun 25 18:06:24.122234 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice - Slice /system/coreos-metadata-sshkeys. Jun 25 18:06:24.123035 containerd[1645]: time="2024-06-25T18:06:24.122992494Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jun 25 18:06:24.123035 containerd[1645]: time="2024-06-25T18:06:24.123008744Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jun 25 18:06:24.123035 containerd[1645]: time="2024-06-25T18:06:24.123016550Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jun 25 18:06:24.123035 containerd[1645]: time="2024-06-25T18:06:24.123033079Z" level=info msg="loading plugin \"io.containerd.lease.v1.manager\"..." type=io.containerd.lease.v1 Jun 25 18:06:24.123114 containerd[1645]: time="2024-06-25T18:06:24.123044516Z" level=info msg="loading plugin \"io.containerd.nri.v1.nri\"..." type=io.containerd.nri.v1 Jun 25 18:06:24.123114 containerd[1645]: time="2024-06-25T18:06:24.123051426Z" level=info msg="NRI interface is disabled by configuration." Jun 25 18:06:24.123114 containerd[1645]: time="2024-06-25T18:06:24.123058231Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jun 25 18:06:24.123159 containerd[1645]: time="2024-06-25T18:06:24.123124086Z" level=info msg="loading plugin \"io.containerd.runtime.v2.shim\"..." type=io.containerd.runtime.v2 Jun 25 18:06:24.123159 containerd[1645]: time="2024-06-25T18:06:24.123134578Z" level=info msg="loading plugin \"io.containerd.sandbox.store.v1.local\"..." type=io.containerd.sandbox.store.v1 Jun 25 18:06:24.123159 containerd[1645]: time="2024-06-25T18:06:24.123142028Z" level=info msg="loading plugin \"io.containerd.sandbox.controller.v1.local\"..." type=io.containerd.sandbox.controller.v1 Jun 25 18:06:24.123159 containerd[1645]: time="2024-06-25T18:06:24.123149035Z" level=info msg="loading plugin \"io.containerd.streaming.v1.manager\"..." type=io.containerd.streaming.v1 Jun 25 18:06:24.123159 containerd[1645]: time="2024-06-25T18:06:24.123156972Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.123232 containerd[1645]: time="2024-06-25T18:06:24.123167016Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.123232 containerd[1645]: time="2024-06-25T18:06:24.123174244Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.123232 containerd[1645]: time="2024-06-25T18:06:24.123180829Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.123232 containerd[1645]: time="2024-06-25T18:06:24.123188312Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.123232 containerd[1645]: time="2024-06-25T18:06:24.123195443Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.123232 containerd[1645]: time="2024-06-25T18:06:24.123202154Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.123232 containerd[1645]: time="2024-06-25T18:06:24.123208333Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jun 25 18:06:24.123330 containerd[1645]: time="2024-06-25T18:06:24.123260682Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jun 25 18:06:24.123460 containerd[1645]: time="2024-06-25T18:06:24.123388064Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jun 25 18:06:24.123460 containerd[1645]: time="2024-06-25T18:06:24.123401995Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123460 containerd[1645]: time="2024-06-25T18:06:24.123409136Z" level=info msg="loading plugin \"io.containerd.transfer.v1.local\"..." type=io.containerd.transfer.v1 Jun 25 18:06:24.123460 containerd[1645]: time="2024-06-25T18:06:24.123421544Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jun 25 18:06:24.123460 containerd[1645]: time="2024-06-25T18:06:24.123453405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123460 containerd[1645]: time="2024-06-25T18:06:24.123461534Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123468640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123475875Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123484613Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123491994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123510906Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123517330Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123525002Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123595004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandbox-controllers\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123604473Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandboxes\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123611100Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123617887Z" level=info msg="loading plugin \"io.containerd.grpc.v1.streaming\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123624870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123632075Z" level=info msg="loading plugin \"io.containerd.grpc.v1.transfer\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123638583Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123650 containerd[1645]: time="2024-06-25T18:06:24.123644696Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jun 25 18:06:24.123869 containerd[1645]: time="2024-06-25T18:06:24.123783816Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.8 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jun 25 18:06:24.123869 containerd[1645]: time="2024-06-25T18:06:24.123815822Z" level=info msg="Connect containerd service" Jun 25 18:06:24.123869 containerd[1645]: time="2024-06-25T18:06:24.123829324Z" level=info msg="using legacy CRI server" Jun 25 18:06:24.123869 containerd[1645]: time="2024-06-25T18:06:24.123833118Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this" Jun 25 18:06:24.123869 containerd[1645]: time="2024-06-25T18:06:24.123848808Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jun 25 18:06:24.124190 containerd[1645]: time="2024-06-25T18:06:24.124141964Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jun 25 18:06:24.124190 containerd[1645]: time="2024-06-25T18:06:24.124162502Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jun 25 18:06:24.124190 containerd[1645]: time="2024-06-25T18:06:24.124172571Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jun 25 18:06:24.124190 containerd[1645]: time="2024-06-25T18:06:24.124178956Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jun 25 18:06:24.124190 containerd[1645]: time="2024-06-25T18:06:24.124187744Z" level=info msg="skipping tracing processor initialization (no tracing plugin)" error="no OpenTelemetry endpoint: skip plugin" Jun 25 18:06:24.124287 containerd[1645]: time="2024-06-25T18:06:24.124254280Z" level=info msg="Start subscribing containerd event" Jun 25 18:06:24.124287 containerd[1645]: time="2024-06-25T18:06:24.124279351Z" level=info msg="Start recovering state" Jun 25 18:06:24.124318 containerd[1645]: time="2024-06-25T18:06:24.124313940Z" level=info msg="Start event monitor" Jun 25 18:06:24.124334 containerd[1645]: time="2024-06-25T18:06:24.124324814Z" level=info msg="Start snapshots syncer" Jun 25 18:06:24.124334 containerd[1645]: time="2024-06-25T18:06:24.124330426Z" level=info msg="Start cni network conf syncer for default" Jun 25 18:06:24.124366 containerd[1645]: time="2024-06-25T18:06:24.124335309Z" level=info msg="Start streaming server" Jun 25 18:06:24.124366 containerd[1645]: time="2024-06-25T18:06:24.124356823Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jun 25 18:06:24.124402 containerd[1645]: time="2024-06-25T18:06:24.124379482Z" level=info msg=serving... address=/run/containerd/containerd.sock Jun 25 18:06:24.124430 containerd[1645]: time="2024-06-25T18:06:24.124418293Z" level=info msg="containerd successfully booted in 0.030772s" Jun 25 18:06:24.132427 systemd[1]: Starting coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys)... Jun 25 18:06:24.141752 systemd[1]: Started containerd.service - containerd container runtime. Jun 25 18:06:24.162715 coreos-metadata[1695]: Jun 25 18:06:24.162 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jun 25 18:06:24.301387 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Jun 25 18:06:24.327362 extend-filesystems[1625]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Jun 25 18:06:24.327362 extend-filesystems[1625]: old_desc_blocks = 1, new_desc_blocks = 56 Jun 25 18:06:24.327362 extend-filesystems[1625]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Jun 25 18:06:24.365421 extend-filesystems[1616]: Resized filesystem in /dev/sdb9 Jun 25 18:06:24.327888 systemd[1]: extend-filesystems.service: Deactivated successfully. Jun 25 18:06:24.327992 systemd[1]: Finished extend-filesystems.service - Extend Filesystems. Jun 25 18:06:24.417350 sshd_keygen[1638]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jun 25 18:06:24.429883 systemd[1]: Finished sshd-keygen.service - Generate sshd host keys. Jun 25 18:06:24.449924 systemd[1]: Starting issuegen.service - Generate /run/issue... Jun 25 18:06:24.459915 systemd[1]: issuegen.service: Deactivated successfully. Jun 25 18:06:24.460003 systemd[1]: Finished issuegen.service - Generate /run/issue. Jun 25 18:06:24.480998 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Jun 25 18:06:24.490908 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Jun 25 18:06:24.501771 systemd[1]: Started getty@tty1.service - Getty on tty1. Jun 25 18:06:24.511831 systemd[1]: Started serial-getty@ttyS1.service - Serial Getty on ttyS1. Jun 25 18:06:24.521814 systemd[1]: Reached target getty.target - Login Prompts. Jun 25 18:06:29.446713 coreos-metadata[1611]: Jun 25 18:06:29.446 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jun 25 18:06:29.447564 coreos-metadata[1695]: Jun 25 18:06:29.446 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jun 25 18:06:29.538207 login[1717]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jun 25 18:06:29.552081 systemd-logind[1639]: New session 1 of user core. Jun 25 18:06:29.552397 login[1716]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jun 25 18:06:29.552889 systemd[1]: Created slice user-500.slice - User Slice of UID 500. Jun 25 18:06:29.553657 systemd[1]: Starting user-runtime-dir@500.service - User Runtime Directory /run/user/500... Jun 25 18:06:29.556194 systemd-logind[1639]: New session 2 of user core. Jun 25 18:06:29.560205 systemd[1]: Finished user-runtime-dir@500.service - User Runtime Directory /run/user/500. Jun 25 18:06:29.561174 systemd[1]: Starting user@500.service - User Manager for UID 500... Jun 25 18:06:29.563137 (systemd)[1719]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:29.620379 systemd[1719]: Queued start job for default target default.target. Jun 25 18:06:29.633854 systemd[1719]: Reached target paths.target - Paths. Jun 25 18:06:29.633868 systemd[1719]: Reached target sockets.target - Sockets. Jun 25 18:06:29.633877 systemd[1719]: Reached target timers.target - Timers. Jun 25 18:06:29.633884 systemd[1719]: Reached target basic.target - Basic System. Jun 25 18:06:29.633911 systemd[1719]: Reached target default.target - Main User Target. Jun 25 18:06:29.633928 systemd[1719]: Startup finished in 67ms. Jun 25 18:06:29.633988 systemd[1]: Started user@500.service - User Manager for UID 500. Jun 25 18:06:29.634991 systemd[1]: Started session-1.scope - Session 1 of User core. Jun 25 18:06:29.635491 systemd[1]: Started session-2.scope - Session 2 of User core. Jun 25 18:06:30.306847 kernel: mlx5_core 0000:01:00.0: lag map: port 1:2 port 2:2 Jun 25 18:06:30.307018 kernel: mlx5_core 0000:01:00.0: lag map: port 1:1 port 2:2 Jun 25 18:06:30.446854 coreos-metadata[1611]: Jun 25 18:06:30.446 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jun 25 18:06:30.447659 coreos-metadata[1695]: Jun 25 18:06:30.446 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jun 25 18:06:30.494629 systemd[1]: Created slice system-sshd.slice - Slice /system/sshd. Jun 25 18:06:30.495513 systemd[1]: Started sshd@0-136.144.54.115:22-139.178.68.195:58916.service - OpenSSH per-connection server daemon (139.178.68.195:58916). Jun 25 18:06:30.698230 systemd-timesyncd[1596]: Contacted time server 108.59.2.24:123 (0.flatcar.pool.ntp.org). Jun 25 18:06:30.698405 systemd-timesyncd[1596]: Initial clock synchronization to Tue 2024-06-25 18:06:30.992700 UTC. Jun 25 18:06:30.702028 coreos-metadata[1695]: Jun 25 18:06:30.701 INFO Fetch successful Jun 25 18:06:30.706531 coreos-metadata[1611]: Jun 25 18:06:30.706 INFO Fetch successful Jun 25 18:06:30.733942 sshd[1740]: Accepted publickey for core from 139.178.68.195 port 58916 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:30.734854 sshd[1740]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:30.737871 systemd-logind[1639]: New session 3 of user core. Jun 25 18:06:30.750571 systemd[1]: Started session-3.scope - Session 3 of User core. Jun 25 18:06:30.755718 unknown[1695]: wrote ssh authorized keys file for user: core Jun 25 18:06:30.756327 systemd[1]: Finished coreos-metadata.service - Flatcar Metadata Agent. Jun 25 18:06:30.757457 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Jun 25 18:06:30.758317 systemd[1]: Starting packet-phone-home.service - Report Success to Packet... Jun 25 18:06:30.773109 update-ssh-keys[1747]: Updated "/home/core/.ssh/authorized_keys" Jun 25 18:06:30.773366 systemd[1]: Finished coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys). Jun 25 18:06:30.774287 systemd[1]: Finished sshkeys.service. Jun 25 18:06:30.807713 systemd[1]: Started sshd@1-136.144.54.115:22-139.178.68.195:58926.service - OpenSSH per-connection server daemon (139.178.68.195:58926). Jun 25 18:06:30.833346 sshd[1759]: Accepted publickey for core from 139.178.68.195 port 58926 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:30.834148 sshd[1759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:30.836627 systemd-logind[1639]: New session 4 of user core. Jun 25 18:06:30.849670 systemd[1]: Started session-4.scope - Session 4 of User core. Jun 25 18:06:30.850827 systemd[1]: Starting docker.service - Docker Application Container Engine... Jun 25 18:06:30.902053 sshd[1759]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:30.917521 systemd[1]: sshd@1-136.144.54.115:22-139.178.68.195:58926.service: Deactivated successfully. Jun 25 18:06:30.918046 systemd[1]: session-4.scope: Deactivated successfully. Jun 25 18:06:30.918603 systemd-logind[1639]: Session 4 logged out. Waiting for processes to exit. Jun 25 18:06:30.919651 systemd[1]: Started sshd@2-136.144.54.115:22-139.178.68.195:58930.service - OpenSSH per-connection server daemon (139.178.68.195:58930). Jun 25 18:06:30.920397 systemd-logind[1639]: Removed session 4. Jun 25 18:06:30.931514 systemd[1]: Finished packet-phone-home.service - Report Success to Packet. Jun 25 18:06:30.950190 sshd[1768]: Accepted publickey for core from 139.178.68.195 port 58930 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:30.951236 sshd[1768]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:30.954849 systemd-logind[1639]: New session 5 of user core. Jun 25 18:06:30.981605 systemd[1]: Started session-5.scope - Session 5 of User core. Jun 25 18:06:31.033690 sshd[1768]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:31.035126 systemd[1]: sshd@2-136.144.54.115:22-139.178.68.195:58930.service: Deactivated successfully. Jun 25 18:06:31.035533 systemd[1]: session-5.scope: Deactivated successfully. Jun 25 18:06:31.035941 systemd-logind[1639]: Session 5 logged out. Waiting for processes to exit. Jun 25 18:06:31.036403 systemd-logind[1639]: Removed session 5. Jun 25 18:06:31.076547 dockerd[1763]: time="2024-06-25T18:06:31.076482867Z" level=info msg="Starting up" Jun 25 18:06:31.094872 dockerd[1763]: time="2024-06-25T18:06:31.094831553Z" level=info msg="Loading containers: start." Jun 25 18:06:31.199433 kernel: Initializing XFRM netlink socket Jun 25 18:06:31.279724 systemd-networkd[1412]: docker0: Link UP Jun 25 18:06:31.284811 dockerd[1763]: time="2024-06-25T18:06:31.284794681Z" level=info msg="Loading containers: done." Jun 25 18:06:31.377524 dockerd[1763]: time="2024-06-25T18:06:31.377494942Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jun 25 18:06:31.377669 dockerd[1763]: time="2024-06-25T18:06:31.377653744Z" level=info msg="Docker daemon" commit=fca702de7f71362c8d103073c7e4a1d0a467fadd graphdriver=overlay2 version=24.0.9 Jun 25 18:06:31.377751 dockerd[1763]: time="2024-06-25T18:06:31.377739971Z" level=info msg="Daemon has completed initialization" Jun 25 18:06:31.378226 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck897521903-merged.mount: Deactivated successfully. Jun 25 18:06:31.398198 dockerd[1763]: time="2024-06-25T18:06:31.398123030Z" level=info msg="API listen on /run/docker.sock" Jun 25 18:06:31.398256 systemd[1]: Started docker.service - Docker Application Container Engine. Jun 25 18:06:31.398870 etcd-wrapper[1751]: Error response from daemon: No such container: etcd-member Jun 25 18:06:31.411126 etcd-wrapper[1901]: Error response from daemon: No such container: etcd-member Jun 25 18:06:31.436464 etcd-wrapper[1921]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Jun 25 18:06:32.752257 etcd-wrapper[1921]: v3.5.0: Pulling from coreos/etcd Jun 25 18:06:33.101974 etcd-wrapper[1921]: 1813d21adc01: Pulling fs layer Jun 25 18:06:33.101974 etcd-wrapper[1921]: 6e96907ab677: Pulling fs layer Jun 25 18:06:33.101974 etcd-wrapper[1921]: 444ed0ea8673: Pulling fs layer Jun 25 18:06:33.101974 etcd-wrapper[1921]: 0fd2df5633f0: Pulling fs layer Jun 25 18:06:33.101974 etcd-wrapper[1921]: 8cc22b9456bb: Pulling fs layer Jun 25 18:06:33.101974 etcd-wrapper[1921]: 7ac70aecd290: Pulling fs layer Jun 25 18:06:33.101974 etcd-wrapper[1921]: 4b376c64dfe4: Pulling fs layer Jun 25 18:06:33.101974 etcd-wrapper[1921]: 8cc22b9456bb: Waiting Jun 25 18:06:33.103163 etcd-wrapper[1921]: 4b376c64dfe4: Waiting Jun 25 18:06:33.103163 etcd-wrapper[1921]: 0fd2df5633f0: Waiting Jun 25 18:06:33.503537 etcd-wrapper[1921]: 444ed0ea8673: Verifying Checksum Jun 25 18:06:33.503537 etcd-wrapper[1921]: 444ed0ea8673: Download complete Jun 25 18:06:33.521544 etcd-wrapper[1921]: 6e96907ab677: Verifying Checksum Jun 25 18:06:33.521544 etcd-wrapper[1921]: 6e96907ab677: Download complete Jun 25 18:06:33.679605 etcd-wrapper[1921]: 1813d21adc01: Download complete Jun 25 18:06:33.870992 etcd-wrapper[1921]: 0fd2df5633f0: Download complete Jun 25 18:06:33.894377 etcd-wrapper[1921]: 8cc22b9456bb: Verifying Checksum Jun 25 18:06:33.894377 etcd-wrapper[1921]: 8cc22b9456bb: Download complete Jun 25 18:06:34.010766 etcd-wrapper[1921]: 7ac70aecd290: Verifying Checksum Jun 25 18:06:34.010766 etcd-wrapper[1921]: 7ac70aecd290: Download complete Jun 25 18:06:34.032961 etcd-wrapper[1921]: 1813d21adc01: Pull complete Jun 25 18:06:34.114688 systemd[1]: var-lib-docker-overlay2-55f5cdded0a5fad95ce8177af3099e80d86db4599b249c3e52b304bb8d919ecb-merged.mount: Deactivated successfully. Jun 25 18:06:34.178478 etcd-wrapper[1921]: 4b376c64dfe4: Verifying Checksum Jun 25 18:06:34.178478 etcd-wrapper[1921]: 4b376c64dfe4: Download complete Jun 25 18:06:34.345039 etcd-wrapper[1921]: 6e96907ab677: Pull complete Jun 25 18:06:34.434167 systemd[1]: var-lib-docker-overlay2-fdab1bee476fd9f49ea0ae1d7a050ac33901037ff3c70e1f73241f2d4deff899-merged.mount: Deactivated successfully. Jun 25 18:06:34.494987 etcd-wrapper[1921]: 444ed0ea8673: Pull complete Jun 25 18:06:34.633747 etcd-wrapper[1921]: 0fd2df5633f0: Pull complete Jun 25 18:06:34.684681 etcd-wrapper[1921]: 8cc22b9456bb: Pull complete Jun 25 18:06:34.703578 etcd-wrapper[1921]: 7ac70aecd290: Pull complete Jun 25 18:06:34.722709 etcd-wrapper[1921]: 4b376c64dfe4: Pull complete Jun 25 18:06:34.732317 etcd-wrapper[1921]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Jun 25 18:06:34.735053 etcd-wrapper[1921]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Jun 25 18:06:35.031056 containerd[1645]: time="2024-06-25T18:06:35.030978754Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jun 25 18:06:35.031056 containerd[1645]: time="2024-06-25T18:06:35.031021523Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:35.031056 containerd[1645]: time="2024-06-25T18:06:35.031038362Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jun 25 18:06:35.031056 containerd[1645]: time="2024-06-25T18:06:35.031050692Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:35.039743 systemd[1]: var-lib-docker-overlay2-046605c90ab7386b202aae67c880a515a12adf60251d9079662047c41ab5b64e-merged.mount: Deactivated successfully. Jun 25 18:06:35.068679 systemd[1]: Started docker-1ba4063b98daf16810488d841b418766ec1b31153d2c50f993459a0e6b0f0c00.scope - libcontainer container 1ba4063b98daf16810488d841b418766ec1b31153d2c50f993459a0e6b0f0c00. Jun 25 18:06:35.102570 etcd-wrapper[1921]: {"level":"info","ts":1719338795.1023865,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jun 25 18:06:35.102570 etcd-wrapper[1921]: {"level":"info","ts":1719338795.1024308,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"0104a42ad8d34c5faac7d53adc3489e6"} Jun 25 18:06:35.102570 etcd-wrapper[1921]: {"level":"warn","ts":1719338795.1024482,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jun 25 18:06:35.102570 etcd-wrapper[1921]: {"level":"warn","ts":1719338795.1024525,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Jun 25 18:06:35.102570 etcd-wrapper[1921]: {"level":"warn","ts":1719338795.102456,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jun 25 18:06:35.102570 etcd-wrapper[1921]: {"level":"warn","ts":1719338795.1024592,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jun 25 18:06:35.102913 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.102Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.53:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.53:2380","--advertise-client-urls=http://10.67.80.53:2379","--discovery=https://discovery.etcd.io/b93cd131768273d573f0f9b94ccdc48c","--enable-v2=true"]} Jun 25 18:06:35.102913 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.102Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.53:2380"]} Jun 25 18:06:35.102913 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.102Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Jun 25 18:06:35.102989 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.102Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"0104a42ad8d34c5faac7d53adc3489e6","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.53:2380"],"listen-peer-urls":["http://10.67.80.53:2380"],"advertise-client-urls":["http://10.67.80.53:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"0104a42ad8d34c5faac7d53adc3489e6=http://10.67.80.53:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/b93cd131768273d573f0f9b94ccdc48c","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/b93cd131768273d573f0f9b94ccdc48c","discovery-proxy":"","downgrade-check-interval":"5s"} Jun 25 18:06:35.103744 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.103Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"535.155µs"} Jun 25 18:06:35.635478 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.634Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"a76424b6b153f753"} Jun 25 18:06:35.635478 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.634Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"cb90caefc7664a73"} Jun 25 18:06:35.635478 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.634Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"7bf488c9c5ee193d"} Jun 25 18:06:35.635478 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.635Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Jun 25 18:06:35.651086 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.650Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"7bf488c9c5ee193d","cluster-id":"168095ef7c3420cd"} Jun 25 18:06:35.651086 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.650Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=()"} Jun 25 18:06:35.651086 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.650Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d became follower at term 0"} Jun 25 18:06:35.651086 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.650Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 7bf488c9c5ee193d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Jun 25 18:06:35.651086 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.650Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d became follower at term 1"} Jun 25 18:06:35.651939 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.650Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=(8931914361173055805)"} Jun 25 18:06:35.651939 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.650Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=(8931914361173055805 12061806069082748755)"} Jun 25 18:06:35.651939 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.651Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=(8931914361173055805 12061806069082748755 14668447117537069683)"} Jun 25 18:06:35.652302 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:35.651Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Jun 25 18:06:35.653593 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.653Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Jun 25 18:06:35.654224 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.653Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jun 25 18:06:35.654844 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.654Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:35.654844 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.654Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:35.656126 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.655Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:35.657742 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.657Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:35.660055 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.659Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:35.660055 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.659Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753","remote-peer-urls":["http://10.67.80.35:2380"]} Jun 25 18:06:35.660055 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.659Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.660055 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.659Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:35.660055 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.659Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:35.660797 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.659Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.660953 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.660Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.661475 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.660Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.663023 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.662Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.663023 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.662Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73","remote-peer-urls":["http://10.67.80.79:2380"]} Jun 25 18:06:35.663023 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.662Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"7bf488c9c5ee193d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Jun 25 18:06:35.663023 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.662Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.663221 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.662Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Jun 25 18:06:35.663221 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.662Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.663374 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.663Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=(8931914361173055805 12061806069082748755 14668447117537069683)"} Jun 25 18:06:35.663423 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.663Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","added-peer-id":"7bf488c9c5ee193d","added-peer-peer-urls":["http://10.67.80.53:2380"]} Jun 25 18:06:35.663571 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.663Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=(8931914361173055805 12061806069082748755 14668447117537069683)"} Jun 25 18:06:35.663571 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.663Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","added-peer-id":"a76424b6b153f753","added-peer-peer-urls":["http://10.67.80.35:2380"]} Jun 25 18:06:35.663571 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.663Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=(8931914361173055805 12061806069082748755 14668447117537069683)"} Jun 25 18:06:35.663770 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.663Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","added-peer-id":"cb90caefc7664a73","added-peer-peer-urls":["http://10.67.80.79:2380"]} Jun 25 18:06:35.664549 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:35.664Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Jun 25 18:06:35.664593 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.53:2380"} Jun 25 18:06:35.664593 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.53:2380"} Jun 25 18:06:35.664645 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.664645 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.664645 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"7bf488c9c5ee193d","initial-advertise-peer-urls":["http://10.67.80.53:2380"],"listen-peer-urls":["http://10.67.80.53:2380"],"advertise-client-urls":["http://10.67.80.53:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Jun 25 18:06:35.664714 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.664805 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"7bf488c9c5ee193d","to":"cb90caefc7664a73","stream-type":"stream Message"} Jun 25 18:06:35.664805 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"7bf488c9c5ee193d","to":"cb90caefc7664a73","stream-type":"stream MsgApp v2"} Jun 25 18:06:35.664805 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:35.664805 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:35.664Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:36.852975 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.852Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d is starting a new election at term 1"} Jun 25 18:06:36.852975 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.852Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d became pre-candidate at term 1"} Jun 25 18:06:36.852975 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.852Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d received MsgPreVoteResp from 7bf488c9c5ee193d at term 1"} Jun 25 18:06:36.852975 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.852Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d [logterm: 1, index: 3] sent MsgPreVote request to a76424b6b153f753 at term 1"} Jun 25 18:06:36.852975 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.852Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d [logterm: 1, index: 3] sent MsgPreVote request to cb90caefc7664a73 at term 1"} Jun 25 18:06:36.854754 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.854Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d received MsgPreVoteResp from cb90caefc7664a73 at term 1"} Jun 25 18:06:36.854754 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.854Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d has received 2 MsgPreVoteResp votes and 0 vote rejections"} Jun 25 18:06:36.854754 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.854Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d became candidate at term 2"} Jun 25 18:06:36.854754 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.854Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d received MsgVoteResp from 7bf488c9c5ee193d at term 2"} Jun 25 18:06:36.854754 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.854Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d [logterm: 1, index: 3] sent MsgVote request to a76424b6b153f753 at term 2"} Jun 25 18:06:36.854754 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.854Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d [logterm: 1, index: 3] sent MsgVote request to cb90caefc7664a73 at term 2"} Jun 25 18:06:36.856378 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.855Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d received MsgVoteResp from cb90caefc7664a73 at term 2"} Jun 25 18:06:36.856378 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.856Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d has received 2 MsgVoteResp votes and 0 vote rejections"} Jun 25 18:06:36.856378 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.856Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d became leader at term 2"} Jun 25 18:06:36.856378 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.856Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 7bf488c9c5ee193d elected leader 7bf488c9c5ee193d at term 2"} Jun 25 18:06:36.860659 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.860Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"7bf488c9c5ee193d","local-member-attributes":"{Name:0104a42ad8d34c5faac7d53adc3489e6 ClientURLs:[http://10.67.80.53:2379]}","request-path":"/0/members/7bf488c9c5ee193d/attributes","cluster-id":"168095ef7c3420cd","publish-timeout":"7s"} Jun 25 18:06:36.860659 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.860Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jun 25 18:06:36.861359 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.860Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Jun 25 18:06:36.861359 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.860Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Jun 25 18:06:36.861071 systemd[1]: Started etcd-member.service - etcd (System Application Container). Jun 25 18:06:36.863339 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:36.862Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Jun 25 18:06:36.873219 systemd[1]: Starting flanneld.service - flannel - Network fabric for containers (System Application Container)... Jun 25 18:06:36.926370 etcdctl[2026]: { "Network": "10.254.0.0/16", "Backend": {"Type": "vxlan"} } Jun 25 18:06:36.945605 flannel-wrapper[2036]: Error response from daemon: No such container: flannel Jun 25 18:06:36.955181 flannel-wrapper[2045]: Error response from daemon: No such container: flannel Jun 25 18:06:36.966033 flannel-wrapper[2063]: Unable to find image 'quay.io/coreos/flannel:v0.14.0' locally Jun 25 18:06:38.340370 flannel-wrapper[2063]: v0.14.0: Pulling from coreos/flannel Jun 25 18:06:38.660439 flannel-wrapper[2063]: 801bfaa63ef2: Pulling fs layer Jun 25 18:06:38.660439 flannel-wrapper[2063]: e4264a7179f6: Pulling fs layer Jun 25 18:06:38.660439 flannel-wrapper[2063]: bc75ea45ad2e: Pulling fs layer Jun 25 18:06:38.660439 flannel-wrapper[2063]: 78648579d12a: Pulling fs layer Jun 25 18:06:38.660439 flannel-wrapper[2063]: 3393447261e4: Pulling fs layer Jun 25 18:06:38.661168 flannel-wrapper[2063]: 071b96dd834b: Pulling fs layer Jun 25 18:06:38.661168 flannel-wrapper[2063]: 4de2f0468a91: Pulling fs layer Jun 25 18:06:38.661168 flannel-wrapper[2063]: 3393447261e4: Waiting Jun 25 18:06:38.661168 flannel-wrapper[2063]: 071b96dd834b: Waiting Jun 25 18:06:38.661168 flannel-wrapper[2063]: 4de2f0468a91: Waiting Jun 25 18:06:38.858715 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:38.858Z","caller":"etcdserver/cluster_util.go:288","msg":"failed to reach the peer URL","address":"http://10.67.80.35:2380/version","remote-member-id":"a76424b6b153f753","error":"Get \"http://10.67.80.35:2380/version\": dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:06:38.858715 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:38.858Z","caller":"etcdserver/cluster_util.go:155","msg":"failed to get version","remote-member-id":"a76424b6b153f753","error":"Get \"http://10.67.80.35:2380/version\": dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:06:38.859779 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:38.859Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.0"} Jun 25 18:06:38.860792 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:38.860Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","cluster-version":"3.0"} Jun 25 18:06:38.860792 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:38.860Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.0"} Jun 25 18:06:38.860792 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:38.860Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.0"} Jun 25 18:06:38.988419 flannel-wrapper[2063]: bc75ea45ad2e: Verifying Checksum Jun 25 18:06:38.988419 flannel-wrapper[2063]: bc75ea45ad2e: Download complete Jun 25 18:06:39.032737 flannel-wrapper[2063]: 801bfaa63ef2: Verifying Checksum Jun 25 18:06:39.032737 flannel-wrapper[2063]: 801bfaa63ef2: Download complete Jun 25 18:06:39.044499 flannel-wrapper[2063]: e4264a7179f6: Verifying Checksum Jun 25 18:06:39.044499 flannel-wrapper[2063]: e4264a7179f6: Download complete Jun 25 18:06:39.104679 flannel-wrapper[2063]: 801bfaa63ef2: Pull complete Jun 25 18:06:39.209786 systemd[1]: var-lib-docker-overlay2-181bd1de6cfc558084a34392b9b68ba8e467af820ac88c39a464fa1d0366012b-merged.mount: Deactivated successfully. Jun 25 18:06:39.267152 flannel-wrapper[2063]: e4264a7179f6: Pull complete Jun 25 18:06:39.378009 systemd[1]: var-lib-docker-overlay2-a444f3b42599d741fa50d83cff72a67d03a341021af116728da762ca728b0e14-merged.mount: Deactivated successfully. Jun 25 18:06:39.392314 flannel-wrapper[2063]: bc75ea45ad2e: Pull complete Jun 25 18:06:39.396783 flannel-wrapper[2063]: 3393447261e4: Download complete Jun 25 18:06:39.400764 flannel-wrapper[2063]: 071b96dd834b: Verifying Checksum Jun 25 18:06:39.670651 flannel-wrapper[2063]: 78648579d12a: Verifying Checksum Jun 25 18:06:39.670651 flannel-wrapper[2063]: 78648579d12a: Download complete Jun 25 18:06:39.723278 flannel-wrapper[2063]: 4de2f0468a91: Download complete Jun 25 18:06:39.982087 flannel-wrapper[2063]: 78648579d12a: Pull complete Jun 25 18:06:40.002314 flannel-wrapper[2063]: 3393447261e4: Pull complete Jun 25 18:06:40.020962 flannel-wrapper[2063]: 071b96dd834b: Pull complete Jun 25 18:06:40.044289 flannel-wrapper[2063]: 4de2f0468a91: Pull complete Jun 25 18:06:40.052959 flannel-wrapper[2063]: Digest: sha256:4a330b2f2e74046e493b2edc30d61fdebbdddaaedcb32d62736f25be8d3c64d5 Jun 25 18:06:40.055264 flannel-wrapper[2063]: Status: Downloaded newer image for quay.io/coreos/flannel:v0.14.0 Jun 25 18:06:40.114611 systemd[1]: var-lib-docker-overlay2-62f3abaa55ce9b020f36363f91afb3a0918a956609e1a29d7ccdd41a5730e666-merged.mount: Deactivated successfully. Jun 25 18:06:40.147909 containerd[1645]: time="2024-06-25T18:06:40.147645311Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jun 25 18:06:40.147909 containerd[1645]: time="2024-06-25T18:06:40.147780479Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:40.147909 containerd[1645]: time="2024-06-25T18:06:40.147830205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jun 25 18:06:40.147909 containerd[1645]: time="2024-06-25T18:06:40.147863503Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:40.194079 systemd[1]: Started docker-19f52e420e0d3e3afa3c578b795c82b0cca19d86ca7eae3edb577e11f1d6c044.scope - libcontainer container 19f52e420e0d3e3afa3c578b795c82b0cca19d86ca7eae3edb577e11f1d6c044. Jun 25 18:06:40.288730 flannel-wrapper[2063]: I0625 18:06:40.288222 1 main.go:520] Determining IP address of default interface Jun 25 18:06:40.289108 flannel-wrapper[2063]: I0625 18:06:40.288819 1 main.go:533] Using interface with name bond0 and address 136.144.54.115 Jun 25 18:06:40.289108 flannel-wrapper[2063]: I0625 18:06:40.288844 1 main.go:550] Defaulting external address to interface address (136.144.54.115) Jun 25 18:06:40.289315 flannel-wrapper[2063]: I0625 18:06:40.288984 1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: None Jun 25 18:06:40.289315 flannel-wrapper[2063]: I0625 18:06:40.288997 1 main.go:257] Installing signal handlers Jun 25 18:06:40.291789 flannel-wrapper[2063]: I0625 18:06:40.291485 1 main.go:392] Found network config - Backend type: vxlan Jun 25 18:06:40.291789 flannel-wrapper[2063]: I0625 18:06:40.291558 1 vxlan.go:123] VXLAN config: VNI=1 Port=0 GBP=false Learning=false DirectRouting=false Jun 25 18:06:40.317314 flannel-wrapper[2063]: I0625 18:06:40.317071 1 local_manager.go:234] Picking subnet in range 10.254.1.0 ... 10.254.255.0 Jun 25 18:06:40.318405 flannel-wrapper[2063]: I0625 18:06:40.318185 1 local_manager.go:220] Allocated lease (10.254.91.0/24) to current node (136.144.54.115) Jun 25 18:06:40.319509 systemd-networkd[1412]: flannel.1: Link UP Jun 25 18:06:40.319519 systemd-networkd[1412]: flannel.1: Gained carrier Jun 25 18:06:40.320123 flannel-wrapper[2063]: I0625 18:06:40.319662 1 main.go:357] Current network or subnet (10.254.0.0/16, 10.254.91.0/24) is not equal to previous one (0.0.0.0/0, 0.0.0.0/0), trying to recycle old iptables rules Jun 25 18:06:40.339096 flannel-wrapper[2063]: I0625 18:06:40.338826 1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN Jun 25 18:06:40.340481 flannel-wrapper[2063]: I0625 18:06:40.340260 1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Jun 25 18:06:40.341882 flannel-wrapper[2063]: I0625 18:06:40.341665 1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN Jun 25 18:06:40.343302 flannel-wrapper[2063]: I0625 18:06:40.343120 1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j MASQUERADE --random-fully Jun 25 18:06:40.344703 flannel-wrapper[2063]: I0625 18:06:40.344456 1 main.go:307] Setting up masking rules Jun 25 18:06:40.345824 flannel-wrapper[2063]: I0625 18:06:40.345576 1 main.go:315] Changing default FORWARD chain policy to ACCEPT Jun 25 18:06:40.345824 flannel-wrapper[2063]: I0625 18:06:40.345686 1 main.go:323] Wrote subnet file to /run/flannel/subnet.env Jun 25 18:06:40.345824 flannel-wrapper[2063]: I0625 18:06:40.345700 1 main.go:327] Running backend. Jun 25 18:06:40.346066 flannel-wrapper[2063]: I0625 18:06:40.345802 1 vxlan_network.go:59] watching for new subnet leases Jun 25 18:06:40.345971 systemd[1]: Started flanneld.service - flannel - Network fabric for containers (System Application Container). Jun 25 18:06:40.346535 systemd[1]: Reached target multi-user.target - Multi-User System. Jun 25 18:06:40.347506 flannel-wrapper[2063]: I0625 18:06:40.347314 1 main.go:439] Waiting for 22h59m59.970056168s to renew lease Jun 25 18:06:40.348658 flannel-wrapper[2063]: I0625 18:06:40.348504 1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules Jun 25 18:06:40.348658 flannel-wrapper[2063]: I0625 18:06:40.348521 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN Jun 25 18:06:40.349195 flannel-wrapper[2063]: I0625 18:06:40.349039 1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules Jun 25 18:06:40.349195 flannel-wrapper[2063]: I0625 18:06:40.349051 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -j ACCEPT Jun 25 18:06:40.350181 flannel-wrapper[2063]: I0625 18:06:40.349984 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Jun 25 18:06:40.350920 flannel-wrapper[2063]: I0625 18:06:40.350704 1 iptables.go:172] Deleting iptables rule: -d 10.254.0.0/16 -j ACCEPT Jun 25 18:06:40.351562 flannel-wrapper[2063]: I0625 18:06:40.351382 1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.91.0/24 -j RETURN Jun 25 18:06:40.352638 flannel-wrapper[2063]: I0625 18:06:40.352434 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -j ACCEPT Jun 25 18:06:40.353065 flannel-wrapper[2063]: I0625 18:06:40.352868 1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully Jun 25 18:06:40.354407 flannel-wrapper[2063]: I0625 18:06:40.354216 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN Jun 25 18:06:40.355711 flannel-wrapper[2063]: I0625 18:06:40.355492 1 iptables.go:160] Adding iptables rule: -d 10.254.0.0/16 -j ACCEPT Jun 25 18:06:40.357471 flannel-wrapper[2063]: I0625 18:06:40.357213 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Jun 25 18:06:40.360511 flannel-wrapper[2063]: I0625 18:06:40.360256 1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.91.0/24 -j RETURN Jun 25 18:06:40.361998 systemd[1]: Starting flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)... Jun 25 18:06:40.363319 flannel-wrapper[2063]: I0625 18:06:40.363120 1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully Jun 25 18:06:40.364411 systemd[1]: Starting systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP... Jun 25 18:06:40.367205 sh[2197]: + for try in 1 2 3 4 5 6 Jun 25 18:06:40.367205 sh[2197]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i Jun 25 18:06:40.375078 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jun 25 18:06:40.375424 systemd[1]: Finished systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP. Jun 25 18:06:40.392105 sh[2218]: Error response from daemon: No such container: flannel-docker-opts Jun 25 18:06:40.410089 sh[2227]: Error response from daemon: No such container: flannel-docker-opts Jun 25 18:06:40.441296 systemd[1]: var-lib-docker-overlay2-d31534ca0e529ff2bf715f1e08a8a4af2e627b00dd41e81ac30d67d9309c2263\x2dinit-merged.mount: Deactivated successfully. Jun 25 18:06:40.480571 containerd[1645]: time="2024-06-25T18:06:40.480443045Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jun 25 18:06:40.480571 containerd[1645]: time="2024-06-25T18:06:40.480514920Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:40.480571 containerd[1645]: time="2024-06-25T18:06:40.480540651Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jun 25 18:06:40.480571 containerd[1645]: time="2024-06-25T18:06:40.480558092Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:40.508711 systemd[1]: Started docker-aa066b1cdf47a8e37bf17707de004550fee302728945fedeb0dc16c8ecf804df.scope - libcontainer container aa066b1cdf47a8e37bf17707de004550fee302728945fedeb0dc16c8ecf804df. Jun 25 18:06:40.547307 systemd[1]: docker-aa066b1cdf47a8e37bf17707de004550fee302728945fedeb0dc16c8ecf804df.scope: Deactivated successfully. Jun 25 18:06:40.566823 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:40.566Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73","error":"EOF"} Jun 25 18:06:40.566823 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:40.566Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73","error":"EOF"} Jun 25 18:06:40.568901 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:40.568Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"cb90caefc7664a73","error":"failed to dial cb90caefc7664a73 on stream MsgApp v2 (peer cb90caefc7664a73 failed to find local node 7bf488c9c5ee193d)"} Jun 25 18:06:40.574900 dockerd[1763]: time="2024-06-25T18:06:40.574789662Z" level=info msg="ignoring event" container=aa066b1cdf47a8e37bf17707de004550fee302728945fedeb0dc16c8ecf804df module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jun 25 18:06:40.575544 containerd[1645]: time="2024-06-25T18:06:40.574926188Z" level=info msg="shim disconnected" id=aa066b1cdf47a8e37bf17707de004550fee302728945fedeb0dc16c8ecf804df namespace=moby Jun 25 18:06:40.575544 containerd[1645]: time="2024-06-25T18:06:40.575060075Z" level=warning msg="cleaning up after shim disconnected" id=aa066b1cdf47a8e37bf17707de004550fee302728945fedeb0dc16c8ecf804df namespace=moby Jun 25 18:06:40.575544 containerd[1645]: time="2024-06-25T18:06:40.575095264Z" level=info msg="cleaning up dead shim" namespace=moby Jun 25 18:06:40.629772 dockerd[1763]: time="2024-06-25T18:06:40.629673340Z" level=info msg="Processing signal 'terminated'" Jun 25 18:06:40.629838 systemd[1]: Stopping docker.service - Docker Application Container Engine... Jun 25 18:06:40.643622 flannel-wrapper[2063]: I0625 18:06:40.643225 1 main.go:376] shutdownHandler sent cancel signal... Jun 25 18:06:40.644932 flannel-wrapper[2063]: I0625 18:06:40.643450 1 watch.go:40] context canceled, close receiver chan Jun 25 18:06:40.644932 flannel-wrapper[2063]: I0625 18:06:40.643452 1 watch.go:174] context canceled, close receiver chan Jun 25 18:06:40.644932 flannel-wrapper[2063]: I0625 18:06:40.643495 1 vxlan_network.go:74] evts chan closed Jun 25 18:06:40.644932 flannel-wrapper[2063]: I0625 18:06:40.643516 1 main.go:432] Stopped monitoring lease Jun 25 18:06:40.644932 flannel-wrapper[2063]: I0625 18:06:40.643541 1 main.go:345] Waiting for all goroutines to exit Jun 25 18:06:40.644932 flannel-wrapper[2063]: I0625 18:06:40.643561 1 main.go:348] Exiting cleanly... Jun 25 18:06:40.645562 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.644Z","caller":"osutil/interrupt_unix.go:64","msg":"received signal; shutting down","signal":"terminated"} Jun 25 18:06:40.645562 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.644Z","caller":"embed/etcd.go:367","msg":"closing etcd server","name":"0104a42ad8d34c5faac7d53adc3489e6","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.67.80.53:2380"],"advertise-client-urls":["http://10.67.80.53:2379"]} Jun 25 18:06:40.645562 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:40.644Z","caller":"etcdserver/server.go:1477","msg":"leadership transfer failed","local-member-id":"7bf488c9c5ee193d","error":"etcdserver: unhealthy cluster"} Jun 25 18:06:40.645562 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.644Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:40.645562 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.644Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"unknown stream","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:40.645562 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.644Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"unknown stream","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:40.646316 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.645Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:40.646316 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.645Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:40.646316 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.645Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:40.646316 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.645Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:40.646316 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.645Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:40.646316 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:40.645Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:40.646316 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.646Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:40.647193 etcd-wrapper[1921]: {"level":"warn","ts":"2024-06-25T18:06:40.646Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:40.647193 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.646Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:40.647193 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.646Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:40.647193 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.646Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:40.647193 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.646Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:40.647193 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.646Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:40.647920 systemd[1]: docker-19f52e420e0d3e3afa3c578b795c82b0cca19d86ca7eae3edb577e11f1d6c044.scope: Deactivated successfully. Jun 25 18:06:40.648233 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.647Z","caller":"embed/etcd.go:562","msg":"stopping serving peer traffic","address":"10.67.80.53:2380"} Jun 25 18:06:40.650493 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.650Z","caller":"embed/etcd.go:567","msg":"stopped serving peer traffic","address":"10.67.80.53:2380"} Jun 25 18:06:40.650493 etcd-wrapper[1921]: {"level":"info","ts":"2024-06-25T18:06:40.650Z","caller":"embed/etcd.go:369","msg":"closed etcd server","name":"0104a42ad8d34c5faac7d53adc3489e6","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.67.80.53:2380"],"advertise-client-urls":["http://10.67.80.53:2379"]} Jun 25 18:06:40.653878 systemd[1]: docker-1ba4063b98daf16810488d841b418766ec1b31153d2c50f993459a0e6b0f0c00.scope: Deactivated successfully. Jun 25 18:06:40.676600 dockerd[1763]: time="2024-06-25T18:06:40.676501658Z" level=info msg="ignoring event" container=19f52e420e0d3e3afa3c578b795c82b0cca19d86ca7eae3edb577e11f1d6c044 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jun 25 18:06:40.676849 containerd[1645]: time="2024-06-25T18:06:40.676489989Z" level=info msg="shim disconnected" id=19f52e420e0d3e3afa3c578b795c82b0cca19d86ca7eae3edb577e11f1d6c044 namespace=moby Jun 25 18:06:40.676849 containerd[1645]: time="2024-06-25T18:06:40.676623489Z" level=warning msg="cleaning up after shim disconnected" id=19f52e420e0d3e3afa3c578b795c82b0cca19d86ca7eae3edb577e11f1d6c044 namespace=moby Jun 25 18:06:40.676849 containerd[1645]: time="2024-06-25T18:06:40.676669703Z" level=info msg="cleaning up dead shim" namespace=moby Jun 25 18:06:40.678889 containerd[1645]: time="2024-06-25T18:06:40.678761636Z" level=info msg="shim disconnected" id=1ba4063b98daf16810488d841b418766ec1b31153d2c50f993459a0e6b0f0c00 namespace=moby Jun 25 18:06:40.679126 containerd[1645]: time="2024-06-25T18:06:40.679015032Z" level=warning msg="cleaning up after shim disconnected" id=1ba4063b98daf16810488d841b418766ec1b31153d2c50f993459a0e6b0f0c00 namespace=moby Jun 25 18:06:40.679126 containerd[1645]: time="2024-06-25T18:06:40.679073564Z" level=info msg="cleaning up dead shim" namespace=moby Jun 25 18:06:40.679445 dockerd[1763]: time="2024-06-25T18:06:40.678845993Z" level=info msg="ignoring event" container=1ba4063b98daf16810488d841b418766ec1b31153d2c50f993459a0e6b0f0c00 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jun 25 18:06:40.730260 dockerd[1763]: time="2024-06-25T18:06:40.730178979Z" level=info msg="stopping event stream following graceful shutdown" error="" module=libcontainerd namespace=moby Jun 25 18:06:40.730658 dockerd[1763]: time="2024-06-25T18:06:40.730608867Z" level=info msg="Daemon shutdown complete" Jun 25 18:06:40.772766 systemd[1]: docker.service: Deactivated successfully. Jun 25 18:06:40.773414 systemd[1]: Stopped docker.service - Docker Application Container Engine. Jun 25 18:06:40.773549 systemd[1]: docker.service: Consumed 4.235s CPU time. Jun 25 18:06:40.774761 systemd[1]: docker.socket: Deactivated successfully. Jun 25 18:06:40.775684 systemd[1]: Closed docker.socket - Docker Socket for the API. Jun 25 18:06:40.775780 systemd[1]: Stopping docker.socket - Docker Socket for the API... Jun 25 18:06:40.776350 docker[2376]: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running? Jun 25 18:06:40.776959 docker[2377]: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running? Jun 25 18:06:40.779812 systemd[1]: Starting docker.socket - Docker Socket for the API... Jun 25 18:06:40.797013 systemd[1]: flanneld.service: Control process exited, code=exited, status=1/FAILURE Jun 25 18:06:40.800357 systemd[1]: etcd-member.service: Control process exited, code=exited, status=1/FAILURE Jun 25 18:06:40.804373 systemd[1]: Listening on docker.socket - Docker Socket for the API. Jun 25 18:06:40.810313 systemd[1]: Starting docker.service - Docker Application Container Engine... Jun 25 18:06:40.862721 dockerd[2399]: time="2024-06-25T18:06:40.862672602Z" level=info msg="Starting up" Jun 25 18:06:40.870343 dockerd[2399]: time="2024-06-25T18:06:40.870303054Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Jun 25 18:06:40.876731 dockerd[2399]: time="2024-06-25T18:06:40.876685205Z" level=info msg="Loading containers: start." Jun 25 18:06:41.113301 systemd[1]: var-lib-docker-overlay2-c54ed3ca2f25f49188325403e721a0eeacd770e803d81e442134e4affe251403-merged.mount: Deactivated successfully. Jun 25 18:06:41.113610 systemd[1]: var-lib-docker-overlay2-5991bea0c603785cd1f721ee6815138b27f28286225abb13f6c0d4810258a05d-merged.mount: Deactivated successfully. Jun 25 18:06:41.285676 systemd[1]: Started sshd@3-136.144.54.115:22-139.178.68.195:49332.service - OpenSSH per-connection server daemon (139.178.68.195:49332). Jun 25 18:06:41.330778 dockerd[2399]: time="2024-06-25T18:06:41.330713727Z" level=info msg="Loading containers: done." Jun 25 18:06:41.344385 sshd[2512]: Accepted publickey for core from 139.178.68.195 port 49332 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:41.346615 dockerd[2399]: time="2024-06-25T18:06:41.346526599Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jun 25 18:06:41.346935 dockerd[2399]: time="2024-06-25T18:06:41.346861270Z" level=info msg="Docker daemon" commit=fca702de7f71362c8d103073c7e4a1d0a467fadd graphdriver=overlay2 version=24.0.9 Jun 25 18:06:41.347080 dockerd[2399]: time="2024-06-25T18:06:41.346951097Z" level=info msg="Daemon has completed initialization" Jun 25 18:06:41.347619 sshd[2512]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:41.351523 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3706068738-merged.mount: Deactivated successfully. Jun 25 18:06:41.360356 systemd-logind[1639]: New session 6 of user core. Jun 25 18:06:41.371882 systemd[1]: Started session-6.scope - Session 6 of User core. Jun 25 18:06:41.380766 dockerd[2399]: time="2024-06-25T18:06:41.380609615Z" level=info msg="API listen on /run/docker.sock" Jun 25 18:06:41.380803 systemd[1]: Started docker.service - Docker Application Container Engine. Jun 25 18:06:41.382439 sh[2216]: Restarted Docker to apply Flannel options Jun 25 18:06:41.383004 sh[2197]: + break Jun 25 18:06:41.383349 sh[2197]: + '[' 1 '!=' fail ']' Jun 25 18:06:41.383950 systemd[1]: Finished flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container). Jun 25 18:06:41.384302 systemd[1]: Startup finished in 1.814s (kernel) + 17.721s (initrd) + 23.779s (userspace) = 43.314s. Jun 25 18:06:41.387895 docker[2395]: flannel Jun 25 18:06:41.388417 docker[2396]: etcd-member Jun 25 18:06:41.389970 systemd[1]: flanneld.service: Failed with result 'exit-code'. Jun 25 18:06:41.391208 systemd[1]: etcd-member.service: Failed with result 'exit-code'. Jun 25 18:06:41.450216 sshd[2512]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:41.471150 systemd[1]: sshd@3-136.144.54.115:22-139.178.68.195:49332.service: Deactivated successfully. Jun 25 18:06:41.472902 systemd[1]: session-6.scope: Deactivated successfully. Jun 25 18:06:41.474750 systemd-logind[1639]: Session 6 logged out. Waiting for processes to exit. Jun 25 18:06:41.478311 systemd-networkd[1412]: flannel.1: Gained IPv6LL Jun 25 18:06:41.486662 systemd[1]: Started sshd@4-136.144.54.115:22-139.178.68.195:49334.service - OpenSSH per-connection server daemon (139.178.68.195:49334). Jun 25 18:06:41.489357 systemd-logind[1639]: Removed session 6. Jun 25 18:06:41.546113 sshd[2561]: Accepted publickey for core from 139.178.68.195 port 49334 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:41.548535 sshd[2561]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:41.556538 systemd-logind[1639]: New session 7 of user core. Jun 25 18:06:41.568853 systemd[1]: Started session-7.scope - Session 7 of User core. Jun 25 18:06:41.639880 sshd[2561]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:41.649988 systemd[1]: sshd@4-136.144.54.115:22-139.178.68.195:49334.service: Deactivated successfully. Jun 25 18:06:41.650373 systemd[1]: session-7.scope: Deactivated successfully. Jun 25 18:06:41.650855 systemd-logind[1639]: Session 7 logged out. Waiting for processes to exit. Jun 25 18:06:41.651601 systemd[1]: Started sshd@5-136.144.54.115:22-139.178.68.195:49342.service - OpenSSH per-connection server daemon (139.178.68.195:49342). Jun 25 18:06:41.652291 systemd-logind[1639]: Removed session 7. Jun 25 18:06:41.680231 sshd[2568]: Accepted publickey for core from 139.178.68.195 port 49342 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:41.681608 sshd[2568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:41.686411 systemd-logind[1639]: New session 8 of user core. Jun 25 18:06:41.700862 systemd[1]: Started session-8.scope - Session 8 of User core. Jun 25 18:06:41.783020 sshd[2568]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:41.807700 systemd[1]: sshd@5-136.144.54.115:22-139.178.68.195:49342.service: Deactivated successfully. Jun 25 18:06:41.809468 systemd[1]: session-8.scope: Deactivated successfully. Jun 25 18:06:41.811271 systemd-logind[1639]: Session 8 logged out. Waiting for processes to exit. Jun 25 18:06:41.823647 systemd[1]: Started sshd@6-136.144.54.115:22-139.178.68.195:49352.service - OpenSSH per-connection server daemon (139.178.68.195:49352). Jun 25 18:06:41.826327 systemd-logind[1639]: Removed session 8. Jun 25 18:06:41.897752 sshd[2574]: Accepted publickey for core from 139.178.68.195 port 49352 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:41.901079 sshd[2574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:41.912346 systemd-logind[1639]: New session 9 of user core. Jun 25 18:06:41.922876 systemd[1]: Started session-9.scope - Session 9 of User core. Jun 25 18:06:42.021509 sudo[2578]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jun 25 18:06:42.022300 sudo[2578]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jun 25 18:06:42.049922 sudo[2578]: pam_unix(sudo:session): session closed for user root Jun 25 18:06:42.053470 sshd[2574]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:42.071172 systemd[1]: sshd@6-136.144.54.115:22-139.178.68.195:49352.service: Deactivated successfully. Jun 25 18:06:42.072982 systemd[1]: session-9.scope: Deactivated successfully. Jun 25 18:06:42.074857 systemd-logind[1639]: Session 9 logged out. Waiting for processes to exit. Jun 25 18:06:42.092872 systemd[1]: Started sshd@7-136.144.54.115:22-139.178.68.195:49354.service - OpenSSH per-connection server daemon (139.178.68.195:49354). Jun 25 18:06:42.095619 systemd-logind[1639]: Removed session 9. Jun 25 18:06:42.168534 sshd[2582]: Accepted publickey for core from 139.178.68.195 port 49354 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:06:42.171976 sshd[2582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:06:42.183409 systemd-logind[1639]: New session 10 of user core. Jun 25 18:06:42.199006 systemd[1]: Started session-10.scope - Session 10 of User core. Jun 25 18:06:42.271786 sudo[2586]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jun 25 18:06:42.271930 sudo[2586]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jun 25 18:06:42.274017 sudo[2586]: pam_unix(sudo:session): session closed for user root Jun 25 18:06:42.276617 sudo[2585]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jun 25 18:06:42.276756 sudo[2585]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jun 25 18:06:42.289780 systemd[1]: Stopping audit-rules.service - Load Security Auditing Rules... Jun 25 18:06:42.289000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jun 25 18:06:42.290897 auditctl[2589]: No rules Jun 25 18:06:42.291115 systemd[1]: audit-rules.service: Deactivated successfully. Jun 25 18:06:42.291238 systemd[1]: Stopped audit-rules.service - Load Security Auditing Rules. Jun 25 18:06:42.292444 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Jun 25 18:06:42.296019 kernel: kauditd_printk_skb: 86 callbacks suppressed Jun 25 18:06:42.296071 kernel: audit: type=1305 audit(1719338802.289:182): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jun 25 18:06:42.309362 augenrules[2606]: No rules Jun 25 18:06:42.309845 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Jun 25 18:06:42.310571 sudo[2585]: pam_unix(sudo:session): session closed for user root Jun 25 18:06:42.289000 audit[2589]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc91e245c0 a2=420 a3=0 items=0 ppid=1 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:42.311616 sshd[2582]: pam_unix(sshd:session): session closed for user core Jun 25 18:06:42.313579 systemd[1]: sshd@7-136.144.54.115:22-139.178.68.195:49354.service: Deactivated successfully. Jun 25 18:06:42.314123 systemd[1]: session-10.scope: Deactivated successfully. Jun 25 18:06:42.314675 systemd-logind[1639]: Session 10 logged out. Waiting for processes to exit. Jun 25 18:06:42.315640 systemd-logind[1639]: Removed session 10. Jun 25 18:06:42.341861 kernel: audit: type=1300 audit(1719338802.289:182): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc91e245c0 a2=420 a3=0 items=0 ppid=1 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:42.289000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jun 25 18:06:42.352404 kernel: audit: type=1327 audit(1719338802.289:182): proctitle=2F7362696E2F617564697463746C002D44 Jun 25 18:06:42.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:42.374541 kernel: audit: type=1131 audit(1719338802.289:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:42.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:42.397215 kernel: audit: type=1130 audit(1719338802.308:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:42.309000 audit[2585]: USER_END pid=2585 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jun 25 18:06:42.423359 kernel: audit: type=1106 audit(1719338802.309:185): pid=2585 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jun 25 18:06:42.309000 audit[2585]: CRED_DISP pid=2585 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jun 25 18:06:42.447267 kernel: audit: type=1104 audit(1719338802.309:186): pid=2585 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jun 25 18:06:42.311000 audit[2582]: USER_END pid=2582 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:06:42.479485 kernel: audit: type=1106 audit(1719338802.311:187): pid=2582 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:06:42.311000 audit[2582]: CRED_DISP pid=2582 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:06:42.506042 kernel: audit: type=1104 audit(1719338802.311:188): pid=2582 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:06:42.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-136.144.54.115:22-139.178.68.195:49354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:42.531808 kernel: audit: type=1131 audit(1719338802.312:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-136.144.54.115:22-139.178.68.195:49354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.480459 systemd[1]: flanneld.service: Scheduled restart job, restart counter is at 1. Jun 25 18:06:51.482256 systemd[1]: etcd-member.service: Scheduled restart job, restart counter is at 1. Jun 25 18:06:51.493701 systemd[1]: Stopping flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)... Jun 25 18:06:51.501200 docker[2611]: flannel-docker-opts Jun 25 18:06:51.513281 docker[2620]: flannel-docker-opts Jun 25 18:06:51.514039 systemd[1]: flannel-docker-opts.service: Deactivated successfully. Jun 25 18:06:51.514195 systemd[1]: Stopped flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container). Jun 25 18:06:51.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flannel-docker-opts comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.514433 systemd[1]: Stopped flanneld.service - flannel - Network fabric for containers (System Application Container). Jun 25 18:06:51.514518 systemd[1]: Stopped etcd-member.service - etcd (System Application Container). Jun 25 18:06:51.515763 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Jun 25 18:06:51.527646 etcd-wrapper[2632]: Error response from daemon: No such container: etcd-member Jun 25 18:06:51.535287 etcd-wrapper[2642]: Error response from daemon: No such container: etcd-member Jun 25 18:06:51.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.550511 systemd[1]: var-lib-docker-overlay2-014b1e211deba0f9e4ccd828ee6a4f7f2b1f240b55c9ad2779e616357b710b7c\x2dinit-merged.mount: Deactivated successfully. Jun 25 18:06:51.558865 kernel: audit: type=1131 audit(1719338811.512:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flannel-docker-opts comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.558889 kernel: audit: type=1130 audit(1719338811.513:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.597951 kernel: audit: type=1131 audit(1719338811.513:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.654898 kernel: audit: type=1130 audit(1719338811.513:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.711785 kernel: audit: type=1131 audit(1719338811.513:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:51.771248 containerd[1645]: time="2024-06-25T18:06:51.771170335Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jun 25 18:06:51.771248 containerd[1645]: time="2024-06-25T18:06:51.771202894Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:51.771248 containerd[1645]: time="2024-06-25T18:06:51.771218659Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jun 25 18:06:51.771248 containerd[1645]: time="2024-06-25T18:06:51.771229322Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:51.786891 systemd[1]: Started docker-d58a7fb36725e6f78b0b2bfff74eb9b4b050422190f7d53c1bc7590a073e14a9.scope - libcontainer container d58a7fb36725e6f78b0b2bfff74eb9b4b050422190f7d53c1bc7590a073e14a9. Jun 25 18:06:51.799000 audit: BPF prog-id=51 op=LOAD Jun 25 18:06:51.799000 audit: BPF prog-id=52 op=LOAD Jun 25 18:06:51.833470 kernel: audit: type=1334 audit(1719338811.799:195): prog-id=51 op=LOAD Jun 25 18:06:51.833504 kernel: audit: type=1334 audit(1719338811.799:196): prog-id=52 op=LOAD Jun 25 18:06:51.799000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00018d988 a2=78 a3=0 items=0 ppid=2681 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:51.881501 kernel: audit: type=1300 audit(1719338811.799:196): arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00018d988 a2=78 a3=0 items=0 ppid=2681 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:51.939399 kernel: audit: type=1327 audit(1719338811.799:196): proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64353861376662333637323565366637386230623262666666 Jun 25 18:06:51.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64353861376662333637323565366637386230623262666666 Jun 25 18:06:51.799000 audit: BPF prog-id=53 op=LOAD Jun 25 18:06:52.035562 kernel: audit: type=1334 audit(1719338811.799:197): prog-id=53 op=LOAD Jun 25 18:06:51.799000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00018d720 a2=78 a3=0 items=0 ppid=2681 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:51.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64353861376662333637323565366637386230623262666666 Jun 25 18:06:51.799000 audit: BPF prog-id=53 op=UNLOAD Jun 25 18:06:51.799000 audit: BPF prog-id=52 op=UNLOAD Jun 25 18:06:51.800000 audit: BPF prog-id=54 op=LOAD Jun 25 18:06:51.800000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00018dbe0 a2=78 a3=0 items=0 ppid=2681 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:51.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64353861376662333637323565366637386230623262666666 Jun 25 18:06:52.079617 etcd-wrapper[2662]: {"level":"info","ts":1719338812.0794737,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jun 25 18:06:52.079617 etcd-wrapper[2662]: {"level":"info","ts":1719338812.079515,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"0104a42ad8d34c5faac7d53adc3489e6"} Jun 25 18:06:52.079617 etcd-wrapper[2662]: {"level":"warn","ts":1719338812.0795305,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jun 25 18:06:52.079617 etcd-wrapper[2662]: {"level":"warn","ts":1719338812.0795345,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Jun 25 18:06:52.079617 etcd-wrapper[2662]: {"level":"warn","ts":1719338812.0795376,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jun 25 18:06:52.079617 etcd-wrapper[2662]: {"level":"warn","ts":1719338812.0795403,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jun 25 18:06:52.080055 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.079Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.53:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.53:2380","--advertise-client-urls=http://10.67.80.53:2379","--discovery=https://discovery.etcd.io/b93cd131768273d573f0f9b94ccdc48c","--enable-v2=true"]} Jun 25 18:06:52.080055 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.079Z","caller":"etcdmain/etcd.go:115","msg":"server has been already initialized","data-dir":"/var/lib/etcd","dir-type":"member"} Jun 25 18:06:52.080055 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.079Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.53:2380"]} Jun 25 18:06:52.080055 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.079Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Jun 25 18:06:52.080200 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.079Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":true,"name":"0104a42ad8d34c5faac7d53adc3489e6","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.53:2380"],"listen-peer-urls":["http://10.67.80.53:2380"],"advertise-client-urls":["http://10.67.80.53:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"","initial-cluster-state":"new","initial-cluster-token":"","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/b93cd131768273d573f0f9b94ccdc48c","discovery-proxy":"","downgrade-check-interval":"5s"} Jun 25 18:06:52.080337 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.080Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"98.166µs"} Jun 25 18:06:52.080380 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:06:52.080Z","caller":"etcdserver/server.go:480","msg":"discovery token is ignored since cluster already initialized; valid logs are found","wal-dir":"/var/lib/etcd/member/wal"} Jun 25 18:06:52.080553 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.080Z","caller":"etcdserver/server.go:526","msg":"No snapshot found. Recovering WAL from scratch!"} Jun 25 18:06:52.080792 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.080Z","caller":"etcdserver/raft.go:483","msg":"restarting local member","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","commit-index":21} Jun 25 18:06:52.080846 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.080Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=()"} Jun 25 18:06:52.080846 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.080Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d became follower at term 2"} Jun 25 18:06:52.080913 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.080Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 7bf488c9c5ee193d [peers: [], term: 2, commit: 21, applied: 0, lastindex: 21, lastterm: 2]"} Jun 25 18:06:52.081051 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.080Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.0"} Jun 25 18:06:52.081294 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.080Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","recovered-remote-peer-id":"7bf488c9c5ee193d","recovered-remote-peer-urls":["http://10.67.80.53:2380"]} Jun 25 18:06:52.081294 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.081Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","recovered-remote-peer-id":"a76424b6b153f753","recovered-remote-peer-urls":["http://10.67.80.35:2380"]} Jun 25 18:06:52.081294 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.081Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","recovered-remote-peer-id":"cb90caefc7664a73","recovered-remote-peer-urls":["http://10.67.80.79:2380"]} Jun 25 18:06:52.081294 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.081Z","caller":"membership/cluster.go:285","msg":"set cluster version from store","cluster-version":"3.0"} Jun 25 18:06:52.089791 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:06:52.089Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Jun 25 18:06:52.091234 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.090Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Jun 25 18:06:52.091832 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.091Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jun 25 18:06:52.092666 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.092Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:52.092666 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.092Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:52.093994 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.093Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:52.095108 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.094Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:52.097239 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.096Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:52.097239 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.096Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753","remote-peer-urls":["http://10.67.80.35:2380"]} Jun 25 18:06:52.097239 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.096Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:52.097809 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.097Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"a76424b6b153f753"} Jun 25 18:06:52.097809 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.096Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.097809 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.097Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.099036 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.097Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.099551 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.098Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.100598 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.100598 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73","remote-peer-urls":["http://10.67.80.79:2380"]} Jun 25 18:06:52.100598 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.100598 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.100598 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"etcdserver/server.go:834","msg":"starting etcd server","local-member-id":"7bf488c9c5ee193d","local-server-version":"3.5.0","cluster-id":"168095ef7c3420cd","cluster-version":"3.0"} Jun 25 18:06:52.100733 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Jun 25 18:06:52.100766 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=(8931914361173055805)"} Jun 25 18:06:52.100799 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","added-peer-id":"7bf488c9c5ee193d","added-peer-peer-urls":["http://10.67.80.53:2380"]} Jun 25 18:06:52.100799 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=(8931914361173055805 12061806069082748755)"} Jun 25 18:06:52.100861 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","added-peer-id":"a76424b6b153f753","added-peer-peer-urls":["http://10.67.80.35:2380"]} Jun 25 18:06:52.100861 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d switched to configuration voters=(8931914361173055805 12061806069082748755 14668447117537069683)"} Jun 25 18:06:52.100861 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","added-peer-id":"cb90caefc7664a73","added-peer-peer-urls":["http://10.67.80.79:2380"]} Jun 25 18:06:52.100943 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.100Z","caller":"membership/cluster.go:523","msg":"updated cluster version","cluster-id":"168095ef7c3420cd","local-member-id":"7bf488c9c5ee193d","from":"3.0","to":"3.0"} Jun 25 18:06:52.101649 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:06:52.101Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Jun 25 18:06:52.101797 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.101Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"7bf488c9c5ee193d","initial-advertise-peer-urls":["http://10.67.80.53:2380"],"listen-peer-urls":["http://10.67.80.53:2380"],"advertise-client-urls":["http://10.67.80.53:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Jun 25 18:06:52.101797 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.101Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.53:2380"} Jun 25 18:06:52.101797 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.101Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.53:2380"} Jun 25 18:06:52.102145 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.102Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.102145 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.102Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.102145 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.102Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.138785 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.138Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"7bf488c9c5ee193d","to":"cb90caefc7664a73","stream-type":"stream Message"} Jun 25 18:06:52.138785 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.138Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:52.138785 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.138Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"7bf488c9c5ee193d","to":"cb90caefc7664a73","stream-type":"stream MsgApp v2"} Jun 25 18:06:52.138785 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:52.138Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"7bf488c9c5ee193d","remote-peer-id":"cb90caefc7664a73"} Jun 25 18:06:53.237536 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.236Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d [logterm: 2, index: 21, vote: 7bf488c9c5ee193d] cast MsgPreVote for cb90caefc7664a73 [logterm: 2, index: 21] at term 2"} Jun 25 18:06:53.239665 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.239Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d [term: 2] received a MsgVote message with higher term from cb90caefc7664a73 [term: 3]"} Jun 25 18:06:53.239665 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.239Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d became follower at term 3"} Jun 25 18:06:53.239665 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.239Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7bf488c9c5ee193d [logterm: 2, index: 21, vote: 0] cast MsgVote for cb90caefc7664a73 [logterm: 2, index: 21] at term 3"} Jun 25 18:06:53.241191 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.240Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 7bf488c9c5ee193d elected leader cb90caefc7664a73 at term 3"} Jun 25 18:06:53.244346 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.243Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"7bf488c9c5ee193d","local-member-attributes":"{Name:0104a42ad8d34c5faac7d53adc3489e6 ClientURLs:[http://10.67.80.53:2379]}","request-path":"/0/members/7bf488c9c5ee193d/attributes","cluster-id":"168095ef7c3420cd","publish-timeout":"7s"} Jun 25 18:06:53.244346 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.243Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jun 25 18:06:53.244787 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.244Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Jun 25 18:06:53.244787 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.244Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Jun 25 18:06:53.244903 systemd[1]: Started etcd-member.service - etcd (System Application Container). Jun 25 18:06:53.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:53.246118 etcd-wrapper[2662]: {"level":"info","ts":"2024-06-25T18:06:53.245Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Jun 25 18:06:53.262157 systemd[1]: Starting flanneld.service - flannel - Network fabric for containers (System Application Container)... Jun 25 18:06:53.281562 etcdctl[2733]: { "Network": "10.254.0.0/16", "Backend": {"Type": "vxlan"} } Jun 25 18:06:53.292568 flannel-wrapper[2743]: Error response from daemon: No such container: flannel Jun 25 18:06:53.300016 flannel-wrapper[2751]: Error response from daemon: No such container: flannel Jun 25 18:06:53.314097 systemd[1]: var-lib-docker-overlay2-1310cdbaaabc20ef31acc597d0d6839c033129908951e9e9ae1d84f3f266fe4f\x2dinit-merged.mount: Deactivated successfully. Jun 25 18:06:53.334482 containerd[1645]: time="2024-06-25T18:06:53.334380981Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jun 25 18:06:53.334482 containerd[1645]: time="2024-06-25T18:06:53.334413730Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:53.334482 containerd[1645]: time="2024-06-25T18:06:53.334426032Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jun 25 18:06:53.334482 containerd[1645]: time="2024-06-25T18:06:53.334432801Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:53.350877 systemd[1]: Started docker-005dfac778444ad2ed85ed196734977c1aaebd111ad4ae18362bdbb5b58daf75.scope - libcontainer container 005dfac778444ad2ed85ed196734977c1aaebd111ad4ae18362bdbb5b58daf75. Jun 25 18:06:53.365000 audit: BPF prog-id=55 op=LOAD Jun 25 18:06:53.365000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=14 a0=5 a1=c00018d988 a2=78 a3=0 items=0 ppid=2787 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:53.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30303564666163373738343434616432656438356564313936 Jun 25 18:06:53.365000 audit: BPF prog-id=56 op=LOAD Jun 25 18:06:53.365000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00018d720 a2=78 a3=0 items=0 ppid=2787 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:53.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30303564666163373738343434616432656438356564313936 Jun 25 18:06:53.365000 audit: BPF prog-id=56 op=UNLOAD Jun 25 18:06:53.365000 audit: BPF prog-id=55 op=UNLOAD Jun 25 18:06:53.365000 audit: BPF prog-id=57 op=LOAD Jun 25 18:06:53.365000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=14 a0=5 a1=c00018dbe0 a2=78 a3=0 items=0 ppid=2787 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:53.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30303564666163373738343434616432656438356564313936 Jun 25 18:06:53.378392 flannel-wrapper[2769]: I0625 18:06:53.378214 1 main.go:520] Determining IP address of default interface Jun 25 18:06:53.378584 flannel-wrapper[2769]: I0625 18:06:53.378432 1 main.go:533] Using interface with name bond0 and address 136.144.54.115 Jun 25 18:06:53.378584 flannel-wrapper[2769]: I0625 18:06:53.378440 1 main.go:550] Defaulting external address to interface address (136.144.54.115) Jun 25 18:06:53.378680 flannel-wrapper[2769]: I0625 18:06:53.378492 1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: 10.254.91.0/24 Jun 25 18:06:53.378680 flannel-wrapper[2769]: I0625 18:06:53.378495 1 main.go:257] Installing signal handlers Jun 25 18:06:53.379768 flannel-wrapper[2769]: I0625 18:06:53.379689 1 main.go:392] Found network config - Backend type: vxlan Jun 25 18:06:53.379803 flannel-wrapper[2769]: I0625 18:06:53.379707 1 vxlan.go:123] VXLAN config: VNI=1 Port=0 GBP=false Learning=false DirectRouting=false Jun 25 18:06:53.381677 flannel-wrapper[2769]: I0625 18:06:53.381628 1 local_manager.go:147] Found lease (10.254.91.0/24) for current IP (136.144.54.115), reusing Jun 25 18:06:53.383169 flannel-wrapper[2769]: I0625 18:06:53.383094 1 main.go:307] Setting up masking rules Jun 25 18:06:53.390332 flannel-wrapper[2769]: I0625 18:06:53.390196 1 main.go:315] Changing default FORWARD chain policy to ACCEPT Jun 25 18:06:53.390332 flannel-wrapper[2769]: I0625 18:06:53.390260 1 main.go:323] Wrote subnet file to /run/flannel/subnet.env Jun 25 18:06:53.390332 flannel-wrapper[2769]: I0625 18:06:53.390265 1 main.go:327] Running backend. Jun 25 18:06:53.390431 flannel-wrapper[2769]: I0625 18:06:53.390348 1 vxlan_network.go:59] watching for new subnet leases Jun 25 18:06:53.390417 systemd[1]: Started flanneld.service - flannel - Network fabric for containers (System Application Container). Jun 25 18:06:53.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:53.391574 flannel-wrapper[2769]: I0625 18:06:53.391479 1 main.go:439] Waiting for 22h59m59.99024454s to renew lease Jun 25 18:06:53.403640 systemd[1]: Starting flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)... Jun 25 18:06:53.406355 sh[2858]: + for try in 1 2 3 4 5 6 Jun 25 18:06:53.406355 sh[2858]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i Jun 25 18:06:53.421476 sh[2865]: Error response from daemon: No such container: flannel-docker-opts Jun 25 18:06:53.435889 sh[2875]: Error response from daemon: No such container: flannel-docker-opts Jun 25 18:06:53.550500 containerd[1645]: time="2024-06-25T18:06:53.550159955Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jun 25 18:06:53.550500 containerd[1645]: time="2024-06-25T18:06:53.550300553Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:53.550500 containerd[1645]: time="2024-06-25T18:06:53.550350461Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jun 25 18:06:53.550500 containerd[1645]: time="2024-06-25T18:06:53.550420541Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jun 25 18:06:53.597880 systemd[1]: Started docker-681c6e0b16b60232f285fbc80f55ad36176a02a698d8c7064ae9ebd58438d7a8.scope - libcontainer container 681c6e0b16b60232f285fbc80f55ad36176a02a698d8c7064ae9ebd58438d7a8. Jun 25 18:06:53.626000 audit: BPF prog-id=58 op=LOAD Jun 25 18:06:53.626000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019d988 a2=78 a3=0 items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:53.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F36383163366530623136623630323332663238356662633830 Jun 25 18:06:53.626000 audit: BPF prog-id=59 op=LOAD Jun 25 18:06:53.626000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019d720 a2=78 a3=0 items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:53.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F36383163366530623136623630323332663238356662633830 Jun 25 18:06:53.626000 audit: BPF prog-id=59 op=UNLOAD Jun 25 18:06:53.626000 audit: BPF prog-id=58 op=UNLOAD Jun 25 18:06:53.626000 audit: BPF prog-id=60 op=LOAD Jun 25 18:06:53.626000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019dbe0 a2=78 a3=0 items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:06:53.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F36383163366530623136623630323332663238356662633830 Jun 25 18:06:53.665667 systemd[1]: docker-681c6e0b16b60232f285fbc80f55ad36176a02a698d8c7064ae9ebd58438d7a8.scope: Deactivated successfully. Jun 25 18:06:53.678000 audit: BPF prog-id=60 op=UNLOAD Jun 25 18:06:53.696551 containerd[1645]: time="2024-06-25T18:06:53.696359890Z" level=info msg="shim disconnected" id=681c6e0b16b60232f285fbc80f55ad36176a02a698d8c7064ae9ebd58438d7a8 namespace=moby Jun 25 18:06:53.696551 containerd[1645]: time="2024-06-25T18:06:53.696509820Z" level=warning msg="cleaning up after shim disconnected" id=681c6e0b16b60232f285fbc80f55ad36176a02a698d8c7064ae9ebd58438d7a8 namespace=moby Jun 25 18:06:53.696551 containerd[1645]: time="2024-06-25T18:06:53.696540046Z" level=info msg="cleaning up dead shim" namespace=moby Jun 25 18:06:53.697149 dockerd[2399]: time="2024-06-25T18:06:53.696901557Z" level=info msg="ignoring event" container=681c6e0b16b60232f285fbc80f55ad36176a02a698d8c7064ae9ebd58438d7a8 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jun 25 18:06:53.737153 systemd[1]: var-lib-docker-overlay2-0800f406ffa7e451fbe59893e66fbc54e14b38b8aaad82318b6ccd915539d640-merged.mount: Deactivated successfully. Jun 25 18:06:53.743841 sh[2858]: + break Jun 25 18:06:53.743841 sh[2858]: + '[' 1 '!=' fail ']' Jun 25 18:06:53.745132 systemd[1]: Finished flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container). Jun 25 18:06:53.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flannel-docker-opts comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:06:57.098671 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:06:57.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s"} Jun 25 18:06:57.098671 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:06:57.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s"} Jun 25 18:07:02.099134 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:02.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:02.099134 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:02.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:07.099307 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:07.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:07.099307 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:07.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:09.085455 update_engine[1641]: I0625 18:07:09.085296 1641 update_attempter.cc:509] Updating boot flags... Jun 25 18:07:09.151394 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 33 scanned by (udev-worker) (2997) Jun 25 18:07:09.197450 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 33 scanned by (udev-worker) (2996) Jun 25 18:07:12.099509 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:12.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:12.099509 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:12.099Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:17.100248 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:17.099Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:17.100248 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:17.099Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:22.100447 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:22.099Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:22.100447 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:22.099Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:27.101008 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:27.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:27.101008 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:27.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:32.101862 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:32.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:32.101862 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:32.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:37.103018 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:37.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:37.103018 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:37.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:42.103476 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:42.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:42.103476 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:42.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:47.104165 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:47.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:47.104165 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:47.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:52.105245 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:52.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:52.105245 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:52.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:57.105625 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:57.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:07:57.105625 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:07:57.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:02.106167 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:02.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:02.106167 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:02.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:07.107358 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:07.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:07.107358 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:07.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:12.107905 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:12.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:12.107905 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:12.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:17.108107 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:17.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:17.108107 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:17.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:18.949195 systemd[1]: Started sshd@8-136.144.54.115:22-193.201.9.156:56080.service - OpenSSH per-connection server daemon (193.201.9.156:56080). Jun 25 18:08:18.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.115:22-193.201.9.156:56080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:18.954591 kernel: kauditd_printk_skb: 33 callbacks suppressed Jun 25 18:08:18.954629 kernel: audit: type=1130 audit(1719338898.948:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.115:22-193.201.9.156:56080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:20.209657 sshd[3095]: Invalid user admin from 193.201.9.156 port 56080 Jun 25 18:08:20.387738 sshd[3095]: Connection reset by invalid user admin 193.201.9.156 port 56080 [preauth] Jun 25 18:08:20.388000 audit[3095]: USER_ERR pid=3095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=193.201.9.156 addr=193.201.9.156 terminal=ssh res=failed' Jun 25 18:08:20.390810 systemd[1]: sshd@8-136.144.54.115:22-193.201.9.156:56080.service: Deactivated successfully. Jun 25 18:08:20.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.115:22-193.201.9.156:56080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:20.498955 kernel: audit: type=1109 audit(1719338900.388:216): pid=3095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=193.201.9.156 addr=193.201.9.156 terminal=ssh res=failed' Jun 25 18:08:20.498990 kernel: audit: type=1131 audit(1719338900.390:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.115:22-193.201.9.156:56080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:08:22.108713 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:22.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:22.108713 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:22.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:27.109362 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:27.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:27.109362 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:27.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:32.110067 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:32.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:32.110067 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:32.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:37.111117 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:37.110Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:37.111117 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:37.110Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:42.112183 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:42.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:42.112183 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:42.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:47.112450 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:47.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:47.112450 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:47.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:52.112973 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:52.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:52.112973 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:52.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:57.113577 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:57.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:08:57.113577 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:08:57.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:02.114983 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:02.114Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:02.114983 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:02.114Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:07.115754 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:07.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:07.115754 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:07.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:12.116023 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:12.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:12.116023 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:12.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:17.116670 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:17.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:17.116670 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:17.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:22.117358 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:22.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:22.117358 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:22.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:27.118292 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:27.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:27.118292 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:27.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:32.119110 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:32.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:32.119110 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:32.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:37.119313 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:37.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:37.119313 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:37.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:42.120481 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:42.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:42.120481 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:42.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:47.121527 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:47.120Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:47.121527 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:47.121Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:52.122553 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:52.121Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:52.122553 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:52.121Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:57.122863 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:57.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:09:57.122863 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:09:57.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:02.123028 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:02.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:02.123028 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:02.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:07.124376 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:07.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:07.124376 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:07.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:12.125177 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:12.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:12.125177 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:12.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:17.126371 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:17.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:17.126371 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:17.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:22.127316 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:22.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:22.127316 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:22.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:27.128098 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:27.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:27.128098 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:27.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:32.128563 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:32.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:32.128563 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:32.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:37.129510 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:37.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:37.129510 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:37.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:42.130105 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:42.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:42.130105 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:42.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:47.130481 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:47.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:47.130481 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:47.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:52.131628 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:52.130Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:52.131628 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:52.130Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:57.131867 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:57.131Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:10:57.131867 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:10:57.131Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:02.132697 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:02.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:02.132697 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:02.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:07.132810 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:07.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:07.132810 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:07.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:12.134249 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:12.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:12.134249 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:12.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:17.134711 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:17.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:17.134711 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:17.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:17.789877 systemd[1]: Started sshd@9-136.144.54.115:22-194.169.175.36:45680.service - OpenSSH per-connection server daemon (194.169.175.36:45680). Jun 25 18:11:17.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.115:22-194.169.175.36:45680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:17.877595 kernel: audit: type=1130 audit(1719339077.788:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.115:22-194.169.175.36:45680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:21.120499 sshd[3319]: Connection closed by authenticating user nobody 194.169.175.36 port 45680 [preauth] Jun 25 18:11:21.119000 audit[3319]: USER_ERR pid=3319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=194.169.175.36 addr=194.169.175.36 terminal=ssh res=failed' Jun 25 18:11:21.123872 systemd[1]: sshd@9-136.144.54.115:22-194.169.175.36:45680.service: Deactivated successfully. Jun 25 18:11:21.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.115:22-194.169.175.36:45680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:21.233449 kernel: audit: type=1109 audit(1719339081.119:219): pid=3319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=194.169.175.36 addr=194.169.175.36 terminal=ssh res=failed' Jun 25 18:11:21.233526 kernel: audit: type=1131 audit(1719339081.123:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.115:22-194.169.175.36:45680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:11:22.135881 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:22.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:22.135881 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:22.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:27.136281 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:27.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:27.136281 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:27.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:32.137135 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:32.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:32.137135 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:32.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:37.138265 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:37.137Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:37.138265 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:37.137Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:42.138830 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:42.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:42.138830 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:42.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:47.139906 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:47.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:47.139906 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:47.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:52.140856 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:52.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:52.140856 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:52.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:57.141553 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:57.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:11:57.141553 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:11:57.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:02.142473 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:02.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:02.142473 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:02.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:07.143215 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:07.142Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:07.143215 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:07.142Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:12.143797 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:12.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:12.143797 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:12.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:17.144220 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:17.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:17.144220 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:17.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:22.145547 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:22.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:22.145547 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:22.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:27.146277 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:27.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:27.146277 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:27.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:32.146563 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:32.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:32.146563 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:32.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:37.147195 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:37.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:37.147195 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:37.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:42.147979 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:42.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:42.147979 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:42.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:47.148136 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:47.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:47.148136 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:47.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:52.148371 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:52.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:52.148371 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:52.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:57.148572 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:57.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:12:57.148572 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:12:57.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:02.149005 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:02.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:02.149005 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:02.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:07.149818 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:07.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:07.149818 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:07.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:12.149885 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:12.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:12.149885 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:12.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:17.150636 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:17.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:17.150636 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:17.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:22.151727 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:22.151Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:22.151727 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:22.151Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:27.152697 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:27.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:27.152697 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:27.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:32.153565 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:32.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:32.153565 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:32.153Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:37.154053 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:37.153Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:37.154053 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:37.153Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:42.154604 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:42.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:42.154604 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:42.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:47.155269 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:47.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:47.155269 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:47.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:52.156445 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:52.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:52.156445 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:52.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:57.157374 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:57.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:13:57.157374 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:13:57.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:02.158245 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:02.157Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:02.158245 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:02.157Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:07.159206 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:07.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:07.159206 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:07.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:12.160330 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:12.159Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:12.160330 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:12.159Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:17.160603 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:17.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:17.160603 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:17.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:18.725863 systemd[1]: Started sshd@10-136.144.54.115:22-150.136.234.7:47276.service - OpenSSH per-connection server daemon (150.136.234.7:47276). Jun 25 18:14:18.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.115:22-150.136.234.7:47276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:14:18.731303 sshd[3547]: Connection closed by 150.136.234.7 port 47276 Jun 25 18:14:18.731587 systemd[1]: sshd@10-136.144.54.115:22-150.136.234.7:47276.service: Deactivated successfully. Jun 25 18:14:18.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.115:22-150.136.234.7:47276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:14:18.838454 kernel: audit: type=1130 audit(1719339258.724:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.115:22-150.136.234.7:47276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:14:18.838528 kernel: audit: type=1131 audit(1719339258.730:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.115:22-150.136.234.7:47276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:14:22.160951 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:22.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:22.160951 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:22.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:27.162049 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:27.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:27.162049 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:27.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:32.163250 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:32.162Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:32.163250 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:32.162Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:37.164412 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:37.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:37.164412 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:37.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:42.165149 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:42.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:42.165149 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:42.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:47.165311 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:47.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:47.165311 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:47.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:52.166263 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:52.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:52.166263 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:52.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:57.167408 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:57.166Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:14:57.167408 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:14:57.166Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:02.167648 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:02.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:02.167648 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:02.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:07.168955 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:07.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:07.168955 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:07.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:12.169213 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:12.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:12.169213 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:12.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:17.169543 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:17.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:17.169543 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:17.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:22.170571 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:22.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:22.170571 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:22.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:27.171476 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:27.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:27.171476 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:27.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:32.171748 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:32.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:32.171748 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:32.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:37.172283 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:37.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:37.172283 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:37.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:42.173414 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:42.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:42.173414 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:42.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:47.174448 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:47.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:47.174448 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:47.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:48.448845 systemd[1]: Started sshd@11-136.144.54.115:22-27.110.249.227:45528.service - OpenSSH per-connection server daemon (27.110.249.227:45528). Jun 25 18:15:48.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.115:22-27.110.249.227:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:15:48.537388 kernel: audit: type=1130 audit(1719339348.448:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.115:22-27.110.249.227:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:15:52.175257 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:52.174Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:52.175257 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:52.174Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:55.306550 sshd[3660]: maximum authentication attempts exceeded for root from 27.110.249.227 port 45528 ssh2 [preauth] Jun 25 18:15:55.306550 sshd[3660]: Disconnecting authenticating user root 27.110.249.227 port 45528: Too many authentication failures [preauth] Jun 25 18:15:55.306000 audit[3660]: USER_ERR pid=3660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:15:55.309864 systemd[1]: sshd@11-136.144.54.115:22-27.110.249.227:45528.service: Deactivated successfully. Jun 25 18:15:55.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.115:22-27.110.249.227:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:15:55.419166 kernel: audit: type=1109 audit(1719339355.306:224): pid=3660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:15:55.419200 kernel: audit: type=1131 audit(1719339355.309:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.115:22-27.110.249.227:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:15:55.667586 systemd[1]: Started sshd@12-136.144.54.115:22-27.110.249.227:45601.service - OpenSSH per-connection server daemon (27.110.249.227:45601). Jun 25 18:15:55.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.115:22-27.110.249.227:45601 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:15:55.756593 kernel: audit: type=1130 audit(1719339355.666:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.115:22-27.110.249.227:45601 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:15:57.176585 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:57.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:15:57.176585 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:15:57.176Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:02.176994 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:02.176Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:02.176994 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:02.176Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:03.992789 sshd[3676]: maximum authentication attempts exceeded for root from 27.110.249.227 port 45601 ssh2 [preauth] Jun 25 18:16:03.992789 sshd[3676]: Disconnecting authenticating user root 27.110.249.227 port 45601: Too many authentication failures [preauth] Jun 25 18:16:03.992000 audit[3676]: USER_ERR pid=3676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:03.996140 systemd[1]: sshd@12-136.144.54.115:22-27.110.249.227:45601.service: Deactivated successfully. Jun 25 18:16:03.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.115:22-27.110.249.227:45601 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:04.107812 kernel: audit: type=1109 audit(1719339363.992:227): pid=3676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:04.107845 kernel: audit: type=1131 audit(1719339363.995:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.115:22-27.110.249.227:45601 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:04.360302 systemd[1]: Started sshd@13-136.144.54.115:22-27.110.249.227:45684.service - OpenSSH per-connection server daemon (27.110.249.227:45684). Jun 25 18:16:04.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.115:22-27.110.249.227:45684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:04.452716 kernel: audit: type=1130 audit(1719339364.359:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.115:22-27.110.249.227:45684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:07.177658 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:07.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:07.177658 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:07.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:12.178332 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:12.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:12.178332 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:12.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:14.197335 sshd[3688]: Received disconnect from 27.110.249.227 port 45684:11: disconnected by user [preauth] Jun 25 18:16:14.197335 sshd[3688]: Disconnected from authenticating user root 27.110.249.227 port 45684 [preauth] Jun 25 18:16:14.196000 audit[3688]: USER_ERR pid=3688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:14.200568 systemd[1]: sshd@13-136.144.54.115:22-27.110.249.227:45684.service: Deactivated successfully. Jun 25 18:16:14.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.115:22-27.110.249.227:45684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:14.291454 kernel: audit: type=1109 audit(1719339374.196:230): pid=3688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:14.291518 kernel: audit: type=1131 audit(1719339374.200:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.115:22-27.110.249.227:45684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:14.395349 systemd[1]: Started sshd@14-136.144.54.115:22-27.110.249.227:45785.service - OpenSSH per-connection server daemon (27.110.249.227:45785). Jun 25 18:16:14.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.115:22-27.110.249.227:45785 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:14.487587 kernel: audit: type=1130 audit(1719339374.394:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.115:22-27.110.249.227:45785 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:17.179599 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:17.178Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:17.179599 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:17.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:22.180610 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:22.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:22.180610 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:22.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:23.545572 sshd[3704]: Invalid user admin from 27.110.249.227 port 45785 Jun 25 18:16:24.471095 sshd[3704]: maximum authentication attempts exceeded for invalid user admin from 27.110.249.227 port 45785 ssh2 [preauth] Jun 25 18:16:24.471095 sshd[3704]: Disconnecting invalid user admin 27.110.249.227 port 45785: Too many authentication failures [preauth] Jun 25 18:16:24.471000 audit[3704]: USER_ERR pid=3704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:24.474364 systemd[1]: sshd@14-136.144.54.115:22-27.110.249.227:45785.service: Deactivated successfully. Jun 25 18:16:24.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.115:22-27.110.249.227:45785 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:24.588767 kernel: audit: type=1109 audit(1719339384.471:233): pid=3704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:24.588802 kernel: audit: type=1131 audit(1719339384.474:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.115:22-27.110.249.227:45785 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:24.854576 systemd[1]: Started sshd@15-136.144.54.115:22-27.110.249.227:45878.service - OpenSSH per-connection server daemon (27.110.249.227:45878). Jun 25 18:16:24.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.115:22-27.110.249.227:45878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:24.947388 kernel: audit: type=1130 audit(1719339384.854:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.115:22-27.110.249.227:45878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:27.181416 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:27.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:27.181416 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:27.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:32.182235 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:32.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:32.182235 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:32.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:32.735249 sshd[3726]: Invalid user admin from 27.110.249.227 port 45878 Jun 25 18:16:34.195278 sshd[3726]: maximum authentication attempts exceeded for invalid user admin from 27.110.249.227 port 45878 ssh2 [preauth] Jun 25 18:16:34.195278 sshd[3726]: Disconnecting invalid user admin 27.110.249.227 port 45878: Too many authentication failures [preauth] Jun 25 18:16:34.195000 audit[3726]: USER_ERR pid=3726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:34.198519 systemd[1]: sshd@15-136.144.54.115:22-27.110.249.227:45878.service: Deactivated successfully. Jun 25 18:16:34.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.115:22-27.110.249.227:45878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:34.289392 kernel: audit: type=1109 audit(1719339394.195:236): pid=3726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:34.289463 kernel: audit: type=1131 audit(1719339394.198:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.115:22-27.110.249.227:45878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:34.577736 systemd[1]: Started sshd@16-136.144.54.115:22-27.110.249.227:45979.service - OpenSSH per-connection server daemon (27.110.249.227:45979). Jun 25 18:16:34.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.115:22-27.110.249.227:45979 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:34.670388 kernel: audit: type=1130 audit(1719339394.577:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.115:22-27.110.249.227:45979 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:35.170903 update_engine[1641]: I0625 18:16:35.170790 1641 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Jun 25 18:16:35.170903 update_engine[1641]: I0625 18:16:35.170871 1641 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Jun 25 18:16:35.171874 update_engine[1641]: I0625 18:16:35.171239 1641 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Jun 25 18:16:35.172356 update_engine[1641]: I0625 18:16:35.172282 1641 omaha_request_params.cc:62] Current group set to stable Jun 25 18:16:35.172627 update_engine[1641]: I0625 18:16:35.172524 1641 update_attempter.cc:499] Already updated boot flags. Skipping. Jun 25 18:16:35.172627 update_engine[1641]: I0625 18:16:35.172544 1641 update_attempter.cc:643] Scheduling an action processor start. Jun 25 18:16:35.172627 update_engine[1641]: I0625 18:16:35.172574 1641 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jun 25 18:16:35.172978 update_engine[1641]: I0625 18:16:35.172645 1641 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Jun 25 18:16:35.172978 update_engine[1641]: I0625 18:16:35.172799 1641 omaha_request_action.cc:271] Posting an Omaha request to disabled Jun 25 18:16:35.172978 update_engine[1641]: I0625 18:16:35.172816 1641 omaha_request_action.cc:272] Request: Jun 25 18:16:35.172978 update_engine[1641]: Jun 25 18:16:35.172978 update_engine[1641]: Jun 25 18:16:35.172978 update_engine[1641]: Jun 25 18:16:35.172978 update_engine[1641]: Jun 25 18:16:35.172978 update_engine[1641]: Jun 25 18:16:35.172978 update_engine[1641]: Jun 25 18:16:35.172978 update_engine[1641]: Jun 25 18:16:35.172978 update_engine[1641]: Jun 25 18:16:35.172978 update_engine[1641]: I0625 18:16:35.172827 1641 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jun 25 18:16:35.174018 locksmithd[1676]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Jun 25 18:16:35.174488 update_engine[1641]: I0625 18:16:35.174453 1641 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jun 25 18:16:35.174590 update_engine[1641]: E0625 18:16:35.174556 1641 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jun 25 18:16:35.174631 update_engine[1641]: I0625 18:16:35.174623 1641 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Jun 25 18:16:37.183088 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:37.182Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:37.183088 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:37.182Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:42.183931 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:42.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:42.183931 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:42.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:43.220745 sshd[3739]: Invalid user admin from 27.110.249.227 port 45979 Jun 25 18:16:43.966300 sshd[3739]: Received disconnect from 27.110.249.227 port 45979:11: disconnected by user [preauth] Jun 25 18:16:43.966300 sshd[3739]: Disconnected from invalid user admin 27.110.249.227 port 45979 [preauth] Jun 25 18:16:43.965000 audit[3739]: USER_ERR pid=3739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:43.969485 systemd[1]: sshd@16-136.144.54.115:22-27.110.249.227:45979.service: Deactivated successfully. Jun 25 18:16:43.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.115:22-27.110.249.227:45979 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:44.084716 kernel: audit: type=1109 audit(1719339403.965:239): pid=3739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:44.084748 kernel: audit: type=1131 audit(1719339403.968:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.115:22-27.110.249.227:45979 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:44.160325 systemd[1]: Started sshd@17-136.144.54.115:22-27.110.249.227:46064.service - OpenSSH per-connection server daemon (27.110.249.227:46064). Jun 25 18:16:44.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.115:22-27.110.249.227:46064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:44.254457 kernel: audit: type=1130 audit(1719339404.159:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.115:22-27.110.249.227:46064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:45.075832 update_engine[1641]: I0625 18:16:45.075697 1641 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jun 25 18:16:45.076671 update_engine[1641]: I0625 18:16:45.076228 1641 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jun 25 18:16:45.076671 update_engine[1641]: E0625 18:16:45.076478 1641 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jun 25 18:16:45.076882 update_engine[1641]: I0625 18:16:45.076733 1641 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Jun 25 18:16:47.184564 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:47.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:47.184564 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:47.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:16:50.304672 sshd[3753]: Invalid user oracle from 27.110.249.227 port 46064 Jun 25 18:16:51.222682 sshd[3753]: maximum authentication attempts exceeded for invalid user oracle from 27.110.249.227 port 46064 ssh2 [preauth] Jun 25 18:16:51.222682 sshd[3753]: Disconnecting invalid user oracle 27.110.249.227 port 46064: Too many authentication failures [preauth] Jun 25 18:16:51.222000 audit[3753]: USER_ERR pid=3753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:51.225981 systemd[1]: sshd@17-136.144.54.115:22-27.110.249.227:46064.service: Deactivated successfully. Jun 25 18:16:51.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.115:22-27.110.249.227:46064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:51.340206 kernel: audit: type=1109 audit(1719339411.222:242): pid=3753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:51.340236 kernel: audit: type=1131 audit(1719339411.225:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.115:22-27.110.249.227:46064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:51.594367 systemd[1]: Started sshd@18-136.144.54.115:22-27.110.249.227:46130.service - OpenSSH per-connection server daemon (27.110.249.227:46130). Jun 25 18:16:51.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-136.144.54.115:22-27.110.249.227:46130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:51.687454 kernel: audit: type=1130 audit(1719339411.593:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-136.144.54.115:22-27.110.249.227:46130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:52.186043 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:52.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:52.186043 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:52.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:55.080077 update_engine[1641]: I0625 18:16:55.079954 1641 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jun 25 18:16:55.080928 update_engine[1641]: I0625 18:16:55.080550 1641 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jun 25 18:16:55.080928 update_engine[1641]: E0625 18:16:55.080770 1641 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jun 25 18:16:55.081140 update_engine[1641]: I0625 18:16:55.081032 1641 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Jun 25 18:16:57.186201 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:57.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:57.186201 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:16:57.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:16:58.673277 sshd[3771]: Invalid user oracle from 27.110.249.227 port 46130 Jun 25 18:16:59.887374 sshd[3771]: maximum authentication attempts exceeded for invalid user oracle from 27.110.249.227 port 46130 ssh2 [preauth] Jun 25 18:16:59.887374 sshd[3771]: Disconnecting invalid user oracle 27.110.249.227 port 46130: Too many authentication failures [preauth] Jun 25 18:16:59.886000 audit[3771]: USER_ERR pid=3771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:59.890704 systemd[1]: sshd@18-136.144.54.115:22-27.110.249.227:46130.service: Deactivated successfully. Jun 25 18:16:59.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-136.144.54.115:22-27.110.249.227:46130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:16:59.981453 kernel: audit: type=1109 audit(1719339419.886:245): pid=3771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:16:59.981520 kernel: audit: type=1131 audit(1719339419.889:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-136.144.54.115:22-27.110.249.227:46130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:00.271565 systemd[1]: Started sshd@19-136.144.54.115:22-27.110.249.227:46219.service - OpenSSH per-connection server daemon (27.110.249.227:46219). Jun 25 18:17:00.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-136.144.54.115:22-27.110.249.227:46219 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:00.366583 kernel: audit: type=1130 audit(1719339420.270:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-136.144.54.115:22-27.110.249.227:46219 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:02.187286 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:02.186Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:02.187286 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:02.186Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:05.080563 update_engine[1641]: I0625 18:17:05.080440 1641 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jun 25 18:17:05.081354 update_engine[1641]: I0625 18:17:05.080965 1641 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jun 25 18:17:05.081354 update_engine[1641]: E0625 18:17:05.081194 1641 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jun 25 18:17:05.081645 update_engine[1641]: I0625 18:17:05.081466 1641 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jun 25 18:17:05.081645 update_engine[1641]: I0625 18:17:05.081486 1641 omaha_request_action.cc:617] Omaha request response: Jun 25 18:17:05.081645 update_engine[1641]: E0625 18:17:05.081630 1641 omaha_request_action.cc:636] Omaha request network transfer failed. Jun 25 18:17:05.081939 update_engine[1641]: I0625 18:17:05.081672 1641 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Jun 25 18:17:05.081939 update_engine[1641]: I0625 18:17:05.081682 1641 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jun 25 18:17:05.081939 update_engine[1641]: I0625 18:17:05.081691 1641 update_attempter.cc:306] Processing Done. Jun 25 18:17:05.081939 update_engine[1641]: E0625 18:17:05.081717 1641 update_attempter.cc:619] Update failed. Jun 25 18:17:05.081939 update_engine[1641]: I0625 18:17:05.081727 1641 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Jun 25 18:17:05.081939 update_engine[1641]: I0625 18:17:05.081735 1641 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Jun 25 18:17:05.081939 update_engine[1641]: I0625 18:17:05.081744 1641 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Jun 25 18:17:05.081939 update_engine[1641]: I0625 18:17:05.081900 1641 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.081950 1641 omaha_request_action.cc:271] Posting an Omaha request to disabled Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.081962 1641 omaha_request_action.cc:272] Request: Jun 25 18:17:05.082826 update_engine[1641]: Jun 25 18:17:05.082826 update_engine[1641]: Jun 25 18:17:05.082826 update_engine[1641]: Jun 25 18:17:05.082826 update_engine[1641]: Jun 25 18:17:05.082826 update_engine[1641]: Jun 25 18:17:05.082826 update_engine[1641]: Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.081972 1641 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.082337 1641 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jun 25 18:17:05.082826 update_engine[1641]: E0625 18:17:05.082538 1641 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.082755 1641 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.082770 1641 omaha_request_action.cc:617] Omaha request response: Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.082780 1641 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.082789 1641 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.082798 1641 update_attempter.cc:306] Processing Done. Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.082804 1641 update_attempter.cc:310] Error event sent. Jun 25 18:17:05.082826 update_engine[1641]: I0625 18:17:05.082830 1641 update_check_scheduler.cc:74] Next update check in 42m4s Jun 25 18:17:05.084477 locksmithd[1676]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Jun 25 18:17:05.084477 locksmithd[1676]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Jun 25 18:17:06.638571 sshd[3788]: Invalid user oracle from 27.110.249.227 port 46219 Jun 25 18:17:07.188155 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:07.187Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:07.188155 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:07.187Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:07.369479 sshd[3788]: Received disconnect from 27.110.249.227 port 46219:11: disconnected by user [preauth] Jun 25 18:17:07.369479 sshd[3788]: Disconnected from invalid user oracle 27.110.249.227 port 46219 [preauth] Jun 25 18:17:07.368000 audit[3788]: USER_ERR pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:07.372630 systemd[1]: sshd@19-136.144.54.115:22-27.110.249.227:46219.service: Deactivated successfully. Jun 25 18:17:07.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-136.144.54.115:22-27.110.249.227:46219 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:07.487653 kernel: audit: type=1109 audit(1719339427.368:248): pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:07.487691 kernel: audit: type=1131 audit(1719339427.371:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-136.144.54.115:22-27.110.249.227:46219 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:07.571739 systemd[1]: Started sshd@20-136.144.54.115:22-27.110.249.227:46296.service - OpenSSH per-connection server daemon (27.110.249.227:46296). Jun 25 18:17:07.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-136.144.54.115:22-27.110.249.227:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:07.665389 kernel: audit: type=1130 audit(1719339427.570:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-136.144.54.115:22-27.110.249.227:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:12.189309 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:12.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:17:12.189309 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:12.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:17:15.102827 sshd[3798]: Invalid user usuario from 27.110.249.227 port 46296 Jun 25 18:17:16.038034 sshd[3798]: maximum authentication attempts exceeded for invalid user usuario from 27.110.249.227 port 46296 ssh2 [preauth] Jun 25 18:17:16.038034 sshd[3798]: Disconnecting invalid user usuario 27.110.249.227 port 46296: Too many authentication failures [preauth] Jun 25 18:17:16.037000 audit[3798]: USER_ERR pid=3798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:16.041297 systemd[1]: sshd@20-136.144.54.115:22-27.110.249.227:46296.service: Deactivated successfully. Jun 25 18:17:16.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-136.144.54.115:22-27.110.249.227:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:16.156116 kernel: audit: type=1109 audit(1719339436.037:251): pid=3798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:16.156147 kernel: audit: type=1131 audit(1719339436.040:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-136.144.54.115:22-27.110.249.227:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:16.396494 systemd[1]: Started sshd@21-136.144.54.115:22-27.110.249.227:46375.service - OpenSSH per-connection server daemon (27.110.249.227:46375). Jun 25 18:17:16.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-136.144.54.115:22-27.110.249.227:46375 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:16.489577 kernel: audit: type=1130 audit(1719339436.395:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-136.144.54.115:22-27.110.249.227:46375 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:17.190188 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:17.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:17.190188 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:17.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:22.190415 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:22.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:17:22.190415 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:22.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:17:22.915465 sshd[3816]: Invalid user usuario from 27.110.249.227 port 46375 Jun 25 18:17:23.825641 sshd[3816]: maximum authentication attempts exceeded for invalid user usuario from 27.110.249.227 port 46375 ssh2 [preauth] Jun 25 18:17:23.825641 sshd[3816]: Disconnecting invalid user usuario 27.110.249.227 port 46375: Too many authentication failures [preauth] Jun 25 18:17:23.825000 audit[3816]: USER_ERR pid=3816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:23.828982 systemd[1]: sshd@21-136.144.54.115:22-27.110.249.227:46375.service: Deactivated successfully. Jun 25 18:17:23.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-136.144.54.115:22-27.110.249.227:46375 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:23.943531 kernel: audit: type=1109 audit(1719339443.825:254): pid=3816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:23.943563 kernel: audit: type=1131 audit(1719339443.828:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-136.144.54.115:22-27.110.249.227:46375 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:24.187532 systemd[1]: Started sshd@22-136.144.54.115:22-27.110.249.227:46449.service - OpenSSH per-connection server daemon (27.110.249.227:46449). Jun 25 18:17:24.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-136.144.54.115:22-27.110.249.227:46449 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:24.281537 kernel: audit: type=1130 audit(1719339444.186:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-136.144.54.115:22-27.110.249.227:46449 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:27.191421 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:27.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:27.191421 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:27.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:30.550075 sshd[3826]: Invalid user usuario from 27.110.249.227 port 46449 Jun 25 18:17:31.278046 sshd[3826]: Received disconnect from 27.110.249.227 port 46449:11: disconnected by user [preauth] Jun 25 18:17:31.278046 sshd[3826]: Disconnected from invalid user usuario 27.110.249.227 port 46449 [preauth] Jun 25 18:17:31.277000 audit[3826]: USER_ERR pid=3826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:31.281264 systemd[1]: sshd@22-136.144.54.115:22-27.110.249.227:46449.service: Deactivated successfully. Jun 25 18:17:31.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-136.144.54.115:22-27.110.249.227:46449 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:31.396210 kernel: audit: type=1109 audit(1719339451.277:257): pid=3826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:31.396244 kernel: audit: type=1131 audit(1719339451.280:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-136.144.54.115:22-27.110.249.227:46449 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:31.482337 systemd[1]: Started sshd@23-136.144.54.115:22-27.110.249.227:46531.service - OpenSSH per-connection server daemon (27.110.249.227:46531). Jun 25 18:17:31.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-136.144.54.115:22-27.110.249.227:46531 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:31.576596 kernel: audit: type=1130 audit(1719339451.481:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-136.144.54.115:22-27.110.249.227:46531 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:32.192657 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:32.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:32.192657 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:32.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:37.193463 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:37.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:37.193463 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:37.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:38.896987 sshd[3842]: Invalid user test from 27.110.249.227 port 46531 Jun 25 18:17:40.138199 sshd[3842]: maximum authentication attempts exceeded for invalid user test from 27.110.249.227 port 46531 ssh2 [preauth] Jun 25 18:17:40.138199 sshd[3842]: Disconnecting invalid user test 27.110.249.227 port 46531: Too many authentication failures [preauth] Jun 25 18:17:40.137000 audit[3842]: USER_ERR pid=3842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:40.141445 systemd[1]: sshd@23-136.144.54.115:22-27.110.249.227:46531.service: Deactivated successfully. Jun 25 18:17:40.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-136.144.54.115:22-27.110.249.227:46531 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:40.256829 kernel: audit: type=1109 audit(1719339460.137:260): pid=3842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:40.256860 kernel: audit: type=1131 audit(1719339460.140:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-136.144.54.115:22-27.110.249.227:46531 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:40.512445 systemd[1]: Started sshd@24-136.144.54.115:22-27.110.249.227:46617.service - OpenSSH per-connection server daemon (27.110.249.227:46617). Jun 25 18:17:40.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-136.144.54.115:22-27.110.249.227:46617 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:40.604551 kernel: audit: type=1130 audit(1719339460.511:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-136.144.54.115:22-27.110.249.227:46617 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:42.194581 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:42.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:42.194581 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:42.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:47.195088 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:47.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:47.195088 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:47.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:47.377717 sshd[3858]: Invalid user test from 27.110.249.227 port 46617 Jun 25 18:17:48.311503 sshd[3858]: maximum authentication attempts exceeded for invalid user test from 27.110.249.227 port 46617 ssh2 [preauth] Jun 25 18:17:48.311503 sshd[3858]: Disconnecting invalid user test 27.110.249.227 port 46617: Too many authentication failures [preauth] Jun 25 18:17:48.311000 audit[3858]: USER_ERR pid=3858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:48.314834 systemd[1]: sshd@24-136.144.54.115:22-27.110.249.227:46617.service: Deactivated successfully. Jun 25 18:17:48.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-136.144.54.115:22-27.110.249.227:46617 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:48.429792 kernel: audit: type=1109 audit(1719339468.311:263): pid=3858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:48.429823 kernel: audit: type=1131 audit(1719339468.313:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-136.144.54.115:22-27.110.249.227:46617 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:49.045615 systemd[1]: Started sshd@25-136.144.54.115:22-27.110.249.227:46705.service - OpenSSH per-connection server daemon (27.110.249.227:46705). Jun 25 18:17:49.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-136.144.54.115:22-27.110.249.227:46705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:49.139606 kernel: audit: type=1130 audit(1719339469.044:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-136.144.54.115:22-27.110.249.227:46705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:52.196214 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:52.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:17:52.196214 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:52.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:17:57.196732 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:57.196Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:57.196732 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:17:57.196Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:17:57.367698 sshd[3868]: Invalid user test from 27.110.249.227 port 46705 Jun 25 18:17:58.116840 sshd[3868]: Received disconnect from 27.110.249.227 port 46705:11: disconnected by user [preauth] Jun 25 18:17:58.116840 sshd[3868]: Disconnected from invalid user test 27.110.249.227 port 46705 [preauth] Jun 25 18:17:58.116000 audit[3868]: USER_ERR pid=3868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:58.120043 systemd[1]: sshd@25-136.144.54.115:22-27.110.249.227:46705.service: Deactivated successfully. Jun 25 18:17:58.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-136.144.54.115:22-27.110.249.227:46705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:58.210398 kernel: audit: type=1109 audit(1719339478.116:266): pid=3868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:17:58.210469 kernel: audit: type=1131 audit(1719339478.119:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-136.144.54.115:22-27.110.249.227:46705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:58.310337 systemd[1]: Started sshd@26-136.144.54.115:22-27.110.249.227:46795.service - OpenSSH per-connection server daemon (27.110.249.227:46795). Jun 25 18:17:58.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-136.144.54.115:22-27.110.249.227:46795 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:17:58.404471 kernel: audit: type=1130 audit(1719339478.309:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-136.144.54.115:22-27.110.249.227:46795 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:02.197726 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:02.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:18:02.197726 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:02.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:18:06.231287 sshd[3884]: Invalid user user from 27.110.249.227 port 46795 Jun 25 18:18:07.134018 sshd[3884]: maximum authentication attempts exceeded for invalid user user from 27.110.249.227 port 46795 ssh2 [preauth] Jun 25 18:18:07.134018 sshd[3884]: Disconnecting invalid user user 27.110.249.227 port 46795: Too many authentication failures [preauth] Jun 25 18:18:07.133000 audit[3884]: USER_ERR pid=3884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:07.137337 systemd[1]: sshd@26-136.144.54.115:22-27.110.249.227:46795.service: Deactivated successfully. Jun 25 18:18:07.197929 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:07.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:07.197929 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:07.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:07.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-136.144.54.115:22-27.110.249.227:46795 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:07.252196 kernel: audit: type=1109 audit(1719339487.133:269): pid=3884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:07.252233 kernel: audit: type=1131 audit(1719339487.136:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-136.144.54.115:22-27.110.249.227:46795 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:07.521754 systemd[1]: Started sshd@27-136.144.54.115:22-27.110.249.227:46885.service - OpenSSH per-connection server daemon (27.110.249.227:46885). Jun 25 18:18:07.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-136.144.54.115:22-27.110.249.227:46885 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:07.615406 kernel: audit: type=1130 audit(1719339487.520:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-136.144.54.115:22-27.110.249.227:46885 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:12.198906 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:12.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:12.198906 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:12.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:16.617450 sshd[3901]: Invalid user user from 27.110.249.227 port 46885 Jun 25 18:18:17.199291 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:17.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:17.199291 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:17.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:17.573076 sshd[3901]: maximum authentication attempts exceeded for invalid user user from 27.110.249.227 port 46885 ssh2 [preauth] Jun 25 18:18:17.573076 sshd[3901]: Disconnecting invalid user user 27.110.249.227 port 46885: Too many authentication failures [preauth] Jun 25 18:18:17.572000 audit[3901]: USER_ERR pid=3901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:17.576369 systemd[1]: sshd@27-136.144.54.115:22-27.110.249.227:46885.service: Deactivated successfully. Jun 25 18:18:17.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-136.144.54.115:22-27.110.249.227:46885 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:17.691303 kernel: audit: type=1109 audit(1719339497.572:272): pid=3901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:17.691336 kernel: audit: type=1131 audit(1719339497.575:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-136.144.54.115:22-27.110.249.227:46885 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:17.956702 systemd[1]: Started sshd@28-136.144.54.115:22-27.110.249.227:46977.service - OpenSSH per-connection server daemon (27.110.249.227:46977). Jun 25 18:18:17.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-136.144.54.115:22-27.110.249.227:46977 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:18.050388 kernel: audit: type=1130 audit(1719339497.955:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-136.144.54.115:22-27.110.249.227:46977 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:22.200708 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:22.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:22.200708 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:22.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:24.132323 sshd[3917]: Invalid user user from 27.110.249.227 port 46977 Jun 25 18:18:25.187545 sshd[3917]: Received disconnect from 27.110.249.227 port 46977:11: disconnected by user [preauth] Jun 25 18:18:25.187545 sshd[3917]: Disconnected from invalid user user 27.110.249.227 port 46977 [preauth] Jun 25 18:18:25.186000 audit[3917]: USER_ERR pid=3917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:25.190652 systemd[1]: sshd@28-136.144.54.115:22-27.110.249.227:46977.service: Deactivated successfully. Jun 25 18:18:25.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-136.144.54.115:22-27.110.249.227:46977 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:25.305522 kernel: audit: type=1109 audit(1719339505.186:275): pid=3917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:25.305554 kernel: audit: type=1131 audit(1719339505.189:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-136.144.54.115:22-27.110.249.227:46977 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:25.387698 systemd[1]: Started sshd@29-136.144.54.115:22-27.110.249.227:47054.service - OpenSSH per-connection server daemon (27.110.249.227:47054). Jun 25 18:18:25.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-136.144.54.115:22-27.110.249.227:47054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:25.480592 kernel: audit: type=1130 audit(1719339505.386:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-136.144.54.115:22-27.110.249.227:47054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:27.201312 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:27.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:27.201312 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:27.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:31.834060 sshd[3933]: Invalid user ftpuser from 27.110.249.227 port 47054 Jun 25 18:18:32.201749 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:32.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:18:32.201749 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:32.201Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:18:32.739016 sshd[3933]: maximum authentication attempts exceeded for invalid user ftpuser from 27.110.249.227 port 47054 ssh2 [preauth] Jun 25 18:18:32.739016 sshd[3933]: Disconnecting invalid user ftpuser 27.110.249.227 port 47054: Too many authentication failures [preauth] Jun 25 18:18:32.738000 audit[3933]: USER_ERR pid=3933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:32.742308 systemd[1]: sshd@29-136.144.54.115:22-27.110.249.227:47054.service: Deactivated successfully. Jun 25 18:18:32.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-136.144.54.115:22-27.110.249.227:47054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:32.857536 kernel: audit: type=1109 audit(1719339512.738:278): pid=3933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:32.857578 kernel: audit: type=1131 audit(1719339512.741:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-136.144.54.115:22-27.110.249.227:47054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:33.132770 systemd[1]: Started sshd@30-136.144.54.115:22-27.110.249.227:47128.service - OpenSSH per-connection server daemon (27.110.249.227:47128). Jun 25 18:18:33.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-136.144.54.115:22-27.110.249.227:47128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:33.226599 kernel: audit: type=1130 audit(1719339513.131:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-136.144.54.115:22-27.110.249.227:47128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:37.202806 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:37.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:37.202806 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:37.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:41.045460 sshd[3944]: Invalid user ftpuser from 27.110.249.227 port 47128 Jun 25 18:18:42.006430 sshd[3944]: maximum authentication attempts exceeded for invalid user ftpuser from 27.110.249.227 port 47128 ssh2 [preauth] Jun 25 18:18:42.006430 sshd[3944]: Disconnecting invalid user ftpuser 27.110.249.227 port 47128: Too many authentication failures [preauth] Jun 25 18:18:42.005000 audit[3944]: USER_ERR pid=3944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:42.009700 systemd[1]: sshd@30-136.144.54.115:22-27.110.249.227:47128.service: Deactivated successfully. Jun 25 18:18:42.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-136.144.54.115:22-27.110.249.227:47128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:42.124535 kernel: audit: type=1109 audit(1719339522.005:281): pid=3944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:42.124568 kernel: audit: type=1131 audit(1719339522.008:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-136.144.54.115:22-27.110.249.227:47128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:42.202703 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:42.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:18:42.202703 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:42.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:18:42.400840 systemd[1]: Started sshd@31-136.144.54.115:22-27.110.249.227:47214.service - OpenSSH per-connection server daemon (27.110.249.227:47214). Jun 25 18:18:42.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-136.144.54.115:22-27.110.249.227:47214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:42.495601 kernel: audit: type=1130 audit(1719339522.399:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-136.144.54.115:22-27.110.249.227:47214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:47.203150 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:47.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:47.203150 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:47.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:49.604658 sshd[3960]: Invalid user ftpuser from 27.110.249.227 port 47214 Jun 25 18:18:50.359574 sshd[3960]: Received disconnect from 27.110.249.227 port 47214:11: disconnected by user [preauth] Jun 25 18:18:50.359574 sshd[3960]: Disconnected from invalid user ftpuser 27.110.249.227 port 47214 [preauth] Jun 25 18:18:50.358000 audit[3960]: USER_ERR pid=3960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:50.362744 systemd[1]: sshd@31-136.144.54.115:22-27.110.249.227:47214.service: Deactivated successfully. Jun 25 18:18:50.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-136.144.54.115:22-27.110.249.227:47214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:50.477757 kernel: audit: type=1109 audit(1719339530.358:284): pid=3960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:18:50.477788 kernel: audit: type=1131 audit(1719339530.361:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-136.144.54.115:22-27.110.249.227:47214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:50.557842 systemd[1]: Started sshd@32-136.144.54.115:22-27.110.249.227:47289.service - OpenSSH per-connection server daemon (27.110.249.227:47289). Jun 25 18:18:50.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-136.144.54.115:22-27.110.249.227:47289 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:50.652582 kernel: audit: type=1130 audit(1719339530.556:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-136.144.54.115:22-27.110.249.227:47289 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:18:52.204099 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:52.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:52.204099 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:52.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:57.205183 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:57.204Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:57.205183 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:18:57.204Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:18:58.943953 sshd[3977]: Invalid user test1 from 27.110.249.227 port 47289 Jun 25 18:19:00.081560 sshd[3977]: maximum authentication attempts exceeded for invalid user test1 from 27.110.249.227 port 47289 ssh2 [preauth] Jun 25 18:19:00.081560 sshd[3977]: Disconnecting invalid user test1 27.110.249.227 port 47289: Too many authentication failures [preauth] Jun 25 18:19:00.082000 audit[3977]: USER_ERR pid=3977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:00.085055 systemd[1]: sshd@32-136.144.54.115:22-27.110.249.227:47289.service: Deactivated successfully. Jun 25 18:19:00.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-136.144.54.115:22-27.110.249.227:47289 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:00.199253 kernel: audit: type=1109 audit(1719339540.082:287): pid=3977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:00.199285 kernel: audit: type=1131 audit(1719339540.085:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-136.144.54.115:22-27.110.249.227:47289 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:00.437729 systemd[1]: Started sshd@33-136.144.54.115:22-27.110.249.227:47390.service - OpenSSH per-connection server daemon (27.110.249.227:47390). Jun 25 18:19:00.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-136.144.54.115:22-27.110.249.227:47390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:00.531592 kernel: audit: type=1130 audit(1719339540.437:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-136.144.54.115:22-27.110.249.227:47390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:02.206241 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:02.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:19:02.206241 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:02.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:19:06.968293 sshd[3994]: Invalid user test1 from 27.110.249.227 port 47390 Jun 25 18:19:07.207546 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:07.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:19:07.207546 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:07.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:19:07.864773 sshd[3994]: maximum authentication attempts exceeded for invalid user test1 from 27.110.249.227 port 47390 ssh2 [preauth] Jun 25 18:19:07.864773 sshd[3994]: Disconnecting invalid user test1 27.110.249.227 port 47390: Too many authentication failures [preauth] Jun 25 18:19:07.865000 audit[3994]: USER_ERR pid=3994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:07.868087 systemd[1]: sshd@33-136.144.54.115:22-27.110.249.227:47390.service: Deactivated successfully. Jun 25 18:19:07.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-136.144.54.115:22-27.110.249.227:47390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:07.959455 kernel: audit: type=1109 audit(1719339547.865:290): pid=3994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:07.959507 kernel: audit: type=1131 audit(1719339547.868:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-136.144.54.115:22-27.110.249.227:47390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:08.233659 systemd[1]: Started sshd@34-136.144.54.115:22-27.110.249.227:47476.service - OpenSSH per-connection server daemon (27.110.249.227:47476). Jun 25 18:19:08.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-136.144.54.115:22-27.110.249.227:47476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:08.333598 kernel: audit: type=1130 audit(1719339548.233:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-136.144.54.115:22-27.110.249.227:47476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:12.207750 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:12.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:19:12.207750 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:12.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:19:17.208998 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:17.208Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:19:17.208998 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:17.208Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:19:17.551032 sshd[4005]: Invalid user test1 from 27.110.249.227 port 47476 Jun 25 18:19:18.648836 sshd[4005]: Received disconnect from 27.110.249.227 port 47476:11: disconnected by user [preauth] Jun 25 18:19:18.648836 sshd[4005]: Disconnected from invalid user test1 27.110.249.227 port 47476 [preauth] Jun 25 18:19:18.649000 audit[4005]: USER_ERR pid=4005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:18.651950 systemd[1]: sshd@34-136.144.54.115:22-27.110.249.227:47476.service: Deactivated successfully. Jun 25 18:19:18.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-136.144.54.115:22-27.110.249.227:47476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:18.766991 kernel: audit: type=1109 audit(1719339558.649:293): pid=4005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:18.767023 kernel: audit: type=1131 audit(1719339558.652:294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-136.144.54.115:22-27.110.249.227:47476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:18.846355 systemd[1]: Started sshd@35-136.144.54.115:22-27.110.249.227:47575.service - OpenSSH per-connection server daemon (27.110.249.227:47575). Jun 25 18:19:18.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-136.144.54.115:22-27.110.249.227:47575 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:18.938596 kernel: audit: type=1130 audit(1719339558.846:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-136.144.54.115:22-27.110.249.227:47575 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:22.209184 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:22.208Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:19:22.209184 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:22.208Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:19:25.560997 sshd[4021]: Invalid user test2 from 27.110.249.227 port 47575 Jun 25 18:19:26.689431 sshd[4021]: maximum authentication attempts exceeded for invalid user test2 from 27.110.249.227 port 47575 ssh2 [preauth] Jun 25 18:19:26.689431 sshd[4021]: Disconnecting invalid user test2 27.110.249.227 port 47575: Too many authentication failures [preauth] Jun 25 18:19:26.688000 audit[4021]: USER_ERR pid=4021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:26.692746 systemd[1]: sshd@35-136.144.54.115:22-27.110.249.227:47575.service: Deactivated successfully. Jun 25 18:19:26.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-136.144.54.115:22-27.110.249.227:47575 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:26.783456 kernel: audit: type=1109 audit(1719339566.688:296): pid=4021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:26.783498 kernel: audit: type=1131 audit(1719339566.692:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-136.144.54.115:22-27.110.249.227:47575 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:27.088945 systemd[1]: Started sshd@36-136.144.54.115:22-27.110.249.227:47654.service - OpenSSH per-connection server daemon (27.110.249.227:47654). Jun 25 18:19:27.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-136.144.54.115:22-27.110.249.227:47654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:27.183579 kernel: audit: type=1130 audit(1719339567.088:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-136.144.54.115:22-27.110.249.227:47654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:27.209844 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:27.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:27.209844 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:27.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:32.211139 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:32.210Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:32.211139 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:32.210Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:35.500075 sshd[4037]: Invalid user test2 from 27.110.249.227 port 47654 Jun 25 18:19:36.676769 sshd[4037]: maximum authentication attempts exceeded for invalid user test2 from 27.110.249.227 port 47654 ssh2 [preauth] Jun 25 18:19:36.676769 sshd[4037]: Disconnecting invalid user test2 27.110.249.227 port 47654: Too many authentication failures [preauth] Jun 25 18:19:36.676000 audit[4037]: USER_ERR pid=4037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:36.680059 systemd[1]: sshd@36-136.144.54.115:22-27.110.249.227:47654.service: Deactivated successfully. Jun 25 18:19:36.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-136.144.54.115:22-27.110.249.227:47654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:36.795597 kernel: audit: type=1109 audit(1719339576.676:299): pid=4037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:36.795624 kernel: audit: type=1131 audit(1719339576.679:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-136.144.54.115:22-27.110.249.227:47654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:37.055761 systemd[1]: Started sshd@37-136.144.54.115:22-27.110.249.227:47759.service - OpenSSH per-connection server daemon (27.110.249.227:47759). Jun 25 18:19:37.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-136.144.54.115:22-27.110.249.227:47759 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:37.149596 kernel: audit: type=1130 audit(1719339577.054:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-136.144.54.115:22-27.110.249.227:47759 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:37.212117 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:37.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:37.212117 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:37.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:42.212697 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:42.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:42.212697 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:42.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:46.549522 sshd[4053]: Invalid user test2 from 27.110.249.227 port 47759 Jun 25 18:19:47.212995 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:47.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:47.212995 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:47.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:19:47.287699 sshd[4053]: Received disconnect from 27.110.249.227 port 47759:11: disconnected by user [preauth] Jun 25 18:19:47.287699 sshd[4053]: Disconnected from invalid user test2 27.110.249.227 port 47759 [preauth] Jun 25 18:19:47.287000 audit[4053]: USER_ERR pid=4053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:47.290829 systemd[1]: sshd@37-136.144.54.115:22-27.110.249.227:47759.service: Deactivated successfully. Jun 25 18:19:47.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-136.144.54.115:22-27.110.249.227:47759 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:47.405719 kernel: audit: type=1109 audit(1719339587.287:302): pid=4053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:47.405755 kernel: audit: type=1131 audit(1719339587.289:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-136.144.54.115:22-27.110.249.227:47759 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:47.485319 systemd[1]: Started sshd@38-136.144.54.115:22-27.110.249.227:47858.service - OpenSSH per-connection server daemon (27.110.249.227:47858). Jun 25 18:19:47.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-136.144.54.115:22-27.110.249.227:47858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:47.578458 kernel: audit: type=1130 audit(1719339587.484:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-136.144.54.115:22-27.110.249.227:47858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:52.213322 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:52.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:19:52.213322 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:52.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:19:55.178958 sshd[4069]: Invalid user contador from 27.110.249.227 port 47858 Jun 25 18:19:55.740527 sshd[4069]: Received disconnect from 27.110.249.227 port 47858:11: disconnected by user [preauth] Jun 25 18:19:55.740527 sshd[4069]: Disconnected from invalid user contador 27.110.249.227 port 47858 [preauth] Jun 25 18:19:55.739000 audit[4069]: USER_ERR pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:55.743666 systemd[1]: sshd@38-136.144.54.115:22-27.110.249.227:47858.service: Deactivated successfully. Jun 25 18:19:55.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-136.144.54.115:22-27.110.249.227:47858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:55.858951 kernel: audit: type=1109 audit(1719339595.739:305): pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:19:55.858985 kernel: audit: type=1131 audit(1719339595.742:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-136.144.54.115:22-27.110.249.227:47858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:55.937433 systemd[1]: Started sshd@39-136.144.54.115:22-27.110.249.227:47940.service - OpenSSH per-connection server daemon (27.110.249.227:47940). Jun 25 18:19:55.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-136.144.54.115:22-27.110.249.227:47940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:56.029595 kernel: audit: type=1130 audit(1719339595.936:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-136.144.54.115:22-27.110.249.227:47940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:19:57.214238 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:57.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:19:57.214238 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:19:57.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:02.214990 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:02.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:02.214990 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:02.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:03.851166 sshd[4085]: Invalid user ubuntu from 27.110.249.227 port 47940 Jun 25 18:20:04.970687 sshd[4085]: maximum authentication attempts exceeded for invalid user ubuntu from 27.110.249.227 port 47940 ssh2 [preauth] Jun 25 18:20:04.970687 sshd[4085]: Disconnecting invalid user ubuntu 27.110.249.227 port 47940: Too many authentication failures [preauth] Jun 25 18:20:04.971000 audit[4085]: USER_ERR pid=4085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:04.974002 systemd[1]: sshd@39-136.144.54.115:22-27.110.249.227:47940.service: Deactivated successfully. Jun 25 18:20:05.064415 kernel: audit: type=1109 audit(1719339604.971:308): pid=4085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:05.064487 kernel: audit: type=1131 audit(1719339604.974:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-136.144.54.115:22-27.110.249.227:47940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:04.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-136.144.54.115:22-27.110.249.227:47940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:05.360836 systemd[1]: Started sshd@40-136.144.54.115:22-27.110.249.227:48021.service - OpenSSH per-connection server daemon (27.110.249.227:48021). Jun 25 18:20:05.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-136.144.54.115:22-27.110.249.227:48021 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:05.454592 kernel: audit: type=1130 audit(1719339605.360:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-136.144.54.115:22-27.110.249.227:48021 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:07.215910 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:07.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:07.215910 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:07.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:12.216946 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:12.216Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:12.216946 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:12.216Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:12.448708 sshd[4101]: Invalid user ubuntu from 27.110.249.227 port 48021 Jun 25 18:20:13.395705 sshd[4101]: maximum authentication attempts exceeded for invalid user ubuntu from 27.110.249.227 port 48021 ssh2 [preauth] Jun 25 18:20:13.395705 sshd[4101]: Disconnecting invalid user ubuntu 27.110.249.227 port 48021: Too many authentication failures [preauth] Jun 25 18:20:13.396000 audit[4101]: USER_ERR pid=4101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:13.399184 systemd[1]: sshd@40-136.144.54.115:22-27.110.249.227:48021.service: Deactivated successfully. Jun 25 18:20:13.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-136.144.54.115:22-27.110.249.227:48021 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:13.512796 kernel: audit: type=1109 audit(1719339613.396:311): pid=4101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:13.512831 kernel: audit: type=1131 audit(1719339613.399:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-136.144.54.115:22-27.110.249.227:48021 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:13.779973 systemd[1]: Started sshd@41-136.144.54.115:22-27.110.249.227:48103.service - OpenSSH per-connection server daemon (27.110.249.227:48103). Jun 25 18:20:13.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-136.144.54.115:22-27.110.249.227:48103 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:13.874596 kernel: audit: type=1130 audit(1719339613.779:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-136.144.54.115:22-27.110.249.227:48103 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:17.218151 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:17.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:17.218151 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:17.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:22.218615 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:22.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:22.218615 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:22.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:22.922122 sshd[4111]: Invalid user ubuntu from 27.110.249.227 port 48103 Jun 25 18:20:23.471883 sshd[4111]: Received disconnect from 27.110.249.227 port 48103:11: disconnected by user [preauth] Jun 25 18:20:23.471883 sshd[4111]: Disconnected from invalid user ubuntu 27.110.249.227 port 48103 [preauth] Jun 25 18:20:23.472000 audit[4111]: USER_ERR pid=4111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:23.475070 systemd[1]: sshd@41-136.144.54.115:22-27.110.249.227:48103.service: Deactivated successfully. Jun 25 18:20:23.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-136.144.54.115:22-27.110.249.227:48103 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:23.590373 kernel: audit: type=1109 audit(1719339623.472:314): pid=4111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:23.590451 kernel: audit: type=1131 audit(1719339623.475:315): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-136.144.54.115:22-27.110.249.227:48103 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:23.671442 systemd[1]: Started sshd@42-136.144.54.115:22-27.110.249.227:48200.service - OpenSSH per-connection server daemon (27.110.249.227:48200). Jun 25 18:20:23.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-136.144.54.115:22-27.110.249.227:48200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:23.763388 kernel: audit: type=1130 audit(1719339623.671:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-136.144.54.115:22-27.110.249.227:48200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:27.218886 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:27.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:27.218886 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:27.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:31.420586 sshd[4127]: Invalid user pi from 27.110.249.227 port 48200 Jun 25 18:20:31.947445 sshd[4127]: Received disconnect from 27.110.249.227 port 48200:11: disconnected by user [preauth] Jun 25 18:20:31.947445 sshd[4127]: Disconnected from invalid user pi 27.110.249.227 port 48200 [preauth] Jun 25 18:20:31.946000 audit[4127]: USER_ERR pid=4127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:31.950643 systemd[1]: sshd@42-136.144.54.115:22-27.110.249.227:48200.service: Deactivated successfully. Jun 25 18:20:31.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-136.144.54.115:22-27.110.249.227:48200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:32.041445 kernel: audit: type=1109 audit(1719339631.946:317): pid=4127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:32.041492 kernel: audit: type=1131 audit(1719339631.949:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-136.144.54.115:22-27.110.249.227:48200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:32.148691 systemd[1]: Started sshd@43-136.144.54.115:22-27.110.249.227:48287.service - OpenSSH per-connection server daemon (27.110.249.227:48287). Jun 25 18:20:32.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-136.144.54.115:22-27.110.249.227:48287 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:32.218678 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:32.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:32.218678 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:32.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:32.241581 kernel: audit: type=1130 audit(1719339632.147:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-136.144.54.115:22-27.110.249.227:48287 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:37.219527 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:37.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:37.219527 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:37.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:40.199976 sshd[4143]: Invalid user baikal from 27.110.249.227 port 48287 Jun 25 18:20:40.384167 sshd[4143]: Received disconnect from 27.110.249.227 port 48287:11: disconnected by user [preauth] Jun 25 18:20:40.384167 sshd[4143]: Disconnected from invalid user baikal 27.110.249.227 port 48287 [preauth] Jun 25 18:20:40.383000 audit[4143]: USER_ERR pid=4143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:40.387306 systemd[1]: sshd@43-136.144.54.115:22-27.110.249.227:48287.service: Deactivated successfully. Jun 25 18:20:40.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-136.144.54.115:22-27.110.249.227:48287 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:40.502350 kernel: audit: type=1109 audit(1719339640.383:320): pid=4143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=27.110.249.227 addr=27.110.249.227 terminal=ssh res=failed' Jun 25 18:20:40.502389 kernel: audit: type=1131 audit(1719339640.386:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-136.144.54.115:22-27.110.249.227:48287 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:20:42.220228 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:42.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:42.220228 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:42.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:47.221424 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:47.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:47.221424 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:47.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:52.222412 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:52.221Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:52.222412 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:52.221Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:57.223177 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:57.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:20:57.223177 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:20:57.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:02.223753 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:02.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:02.223753 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:02.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:07.224881 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:07.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:07.224881 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:07.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:12.225176 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:12.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:12.225176 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:12.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:17.226165 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:17.225Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:17.226165 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:17.225Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:21.744468 systemd[1]: Starting systemd-tmpfiles-clean.service - Cleanup of Temporary Directories... Jun 25 18:21:21.757727 systemd-tmpfiles[4206]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jun 25 18:21:21.757941 systemd-tmpfiles[4206]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jun 25 18:21:21.758175 systemd-tmpfiles[4206]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Jun 25 18:21:21.758618 systemd-tmpfiles[4206]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jun 25 18:21:21.761996 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Jun 25 18:21:21.762086 systemd[1]: Finished systemd-tmpfiles-clean.service - Cleanup of Temporary Directories. Jun 25 18:21:21.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:21:21.763136 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Jun 25 18:21:21.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:21:21.876247 kernel: audit: type=1130 audit(1719339681.761:322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:21:21.876289 kernel: audit: type=1131 audit(1719339681.761:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:21:22.226956 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:22.226Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:22.226956 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:22.226Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:27.227163 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:27.226Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:27.227163 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:27.226Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:32.228005 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:32.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:32.228005 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:32.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:37.229105 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:37.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: no route to host"} Jun 25 18:21:37.229105 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:37.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:42.230289 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:42.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:42.230289 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:42.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:47.230537 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:47.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:47.230537 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:47.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: i/o timeout"} Jun 25 18:21:52.230992 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:52.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:21:52.230992 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:52.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:21:57.232136 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:57.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:21:57.232136 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:21:57.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:02.233370 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:02.232Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:02.233370 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:02.232Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:07.233544 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:07.232Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:07.233544 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:07.233Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:12.234650 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:12.233Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:12.234650 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:12.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:17.235290 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:17.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:17.235290 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:17.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:22.235482 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:22.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:22.235482 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:22.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:27.236302 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:27.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:27.236302 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:27.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:32.237458 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:32.236Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:32.237458 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:32.236Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:37.238426 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:37.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:37.238426 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:37.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:42.239297 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:42.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:42.239297 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:42.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:47.240448 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:47.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:47.240448 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:47.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:52.241078 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:52.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:52.241078 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:52.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:57.241599 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:57.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:22:57.241599 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:22:57.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:02.242442 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:02.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:02.242442 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:02.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:07.243102 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:07.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:07.243102 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:07.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:12.244249 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:12.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:12.244249 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:12.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:17.245296 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:17.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:17.245296 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:17.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:22.245417 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:22.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:22.245417 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:22.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:27.246561 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:27.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:27.246561 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:27.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:32.247447 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:32.246Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:32.247447 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:32.246Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:37.248219 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:37.247Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:37.248219 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:37.247Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:42.249064 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:42.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:42.249064 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:42.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:47.249286 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:47.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:47.249286 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:47.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:52.249672 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:52.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:52.249672 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:52.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:57.250126 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:57.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:23:57.250126 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:23:57.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:02.251299 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:02.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:02.251299 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:02.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:07.251807 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:07.251Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:07.251807 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:07.251Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:12.252766 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:12.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:12.252766 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:12.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:17.253653 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:17.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:17.253653 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:17.253Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:22.254557 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:22.253Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:22.254557 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:22.253Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:27.254862 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:27.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:27.254862 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:27.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:29.783748 systemd[1]: Started sshd@44-136.144.54.115:22-85.209.11.227:27291.service - OpenSSH per-connection server daemon (85.209.11.227:27291). Jun 25 18:24:29.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-136.144.54.115:22-85.209.11.227:27291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:24:29.878583 kernel: audit: type=1130 audit(1719339869.783:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-136.144.54.115:22-85.209.11.227:27291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:24:30.494492 sshd[4438]: Invalid user ubnt from 85.209.11.227 port 27291 Jun 25 18:24:30.742764 sshd[4438]: Connection reset by invalid user ubnt 85.209.11.227 port 27291 [preauth] Jun 25 18:24:30.743000 audit[4438]: USER_ERR pid=4438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=85.209.11.227 addr=85.209.11.227 terminal=ssh res=failed' Jun 25 18:24:30.745915 systemd[1]: sshd@44-136.144.54.115:22-85.209.11.227:27291.service: Deactivated successfully. Jun 25 18:24:30.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-136.144.54.115:22-85.209.11.227:27291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:24:30.860419 kernel: audit: type=1109 audit(1719339870.743:325): pid=4438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=85.209.11.227 addr=85.209.11.227 terminal=ssh res=failed' Jun 25 18:24:30.860453 kernel: audit: type=1131 audit(1719339870.746:326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-136.144.54.115:22-85.209.11.227:27291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:24:32.255477 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:32.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:32.255477 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:32.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:37.256238 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:37.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:37.256238 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:37.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:42.256512 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:42.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:42.256512 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:42.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:47.257029 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:47.256Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:47.257029 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:47.256Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:52.257609 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:52.256Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:52.257609 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:52.257Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:57.258013 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:57.257Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:24:57.258013 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:24:57.257Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:02.258247 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:02.257Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:02.258247 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:02.257Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:07.258480 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:07.257Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:07.258480 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:07.258Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:12.259670 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:12.259Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:12.259670 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:12.259Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:17.260867 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:17.260Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:17.260867 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:17.260Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:22.261592 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:22.261Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:22.261592 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:22.261Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:27.262013 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:27.261Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:27.262013 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:27.261Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:32.262912 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:32.262Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:32.262912 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:32.262Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:37.263825 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:37.263Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:37.263825 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:37.263Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:42.263929 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:42.263Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:42.263929 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:42.263Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:47.264919 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:47.264Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:47.264919 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:47.264Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:52.266047 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:52.265Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:52.266047 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:52.265Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:57.266578 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:57.266Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:25:57.266578 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:25:57.266Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:02.267717 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:02.267Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:02.267717 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:02.267Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:07.268076 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:07.267Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:07.268076 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:07.267Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:12.268373 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:12.267Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:12.268373 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:12.267Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:17.269235 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:17.268Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:17.269235 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:17.268Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:22.270267 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:22.269Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:22.270267 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:22.269Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:27.270903 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:27.270Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:27.270903 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:27.270Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:32.271930 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:32.271Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:32.271930 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:32.271Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:37.273103 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:37.272Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:37.273103 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:37.272Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:42.274099 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:42.273Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:42.274099 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:42.273Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:47.274343 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:47.273Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:47.274343 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:47.273Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:52.275373 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:52.274Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:52.275373 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:52.274Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:57.276063 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:57.275Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:26:57.276063 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:26:57.275Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:02.276926 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:02.276Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:02.276926 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:02.276Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:07.277933 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:07.277Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:07.277933 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:07.277Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:12.279080 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:12.278Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:12.279080 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:12.278Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:17.279975 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:17.279Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:17.279975 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:17.279Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:22.281019 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:22.280Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:22.281019 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:22.280Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:27.282137 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:27.281Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:27.282137 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:27.281Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:32.282856 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:32.282Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:32.282856 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:32.282Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:37.283925 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:37.283Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:37.283925 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:37.283Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:42.284263 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:42.283Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:42.284263 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:42.283Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:47.284998 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:47.284Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:47.284998 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:47.284Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:52.285494 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:52.284Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:52.285494 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:52.285Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:57.285970 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:57.285Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:27:57.285970 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:27:57.285Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:02.286212 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:02.285Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:02.286212 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:02.285Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:07.287222 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:07.286Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:07.287222 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:07.286Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:12.288165 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:12.287Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:12.288165 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:12.287Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:17.288654 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:17.288Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:17.288654 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:17.288Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:22.289801 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:22.289Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:22.289801 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:22.289Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:27.290128 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:27.289Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:27.290128 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:27.289Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:32.291347 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:32.290Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:32.291347 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:32.290Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:37.291883 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:37.291Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:37.291883 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:37.291Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:42.292302 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:42.291Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:42.292302 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:42.291Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:47.293206 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:47.292Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:47.293206 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:47.292Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:52.293492 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:52.292Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:52.293492 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:52.292Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:57.294499 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:57.293Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:28:57.294499 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:28:57.293Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:02.295666 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:02.295Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:02.295666 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:02.295Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:07.296445 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:07.295Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:07.296445 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:07.295Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:12.297466 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:12.296Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:12.297466 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:12.296Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:17.298413 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:17.297Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:17.298413 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:17.297Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:22.299282 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:22.298Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:22.299282 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:22.298Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:27.300292 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:27.299Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:27.300292 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:27.299Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:32.301355 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:32.300Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:32.301355 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:32.300Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:37.301854 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:37.301Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:37.301854 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:37.301Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:42.302033 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:42.301Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:42.302033 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:42.301Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:47.302412 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:47.301Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:47.302412 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:47.301Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:52.303454 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:52.302Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:52.303454 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:52.302Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:57.304562 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:57.303Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:29:57.304562 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:29:57.304Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:02.305091 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:02.304Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:02.305091 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:02.304Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:07.306334 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:07.305Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:07.306334 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:07.305Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:12.306650 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:12.306Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:12.306650 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:12.306Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:17.307803 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:17.307Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:17.307803 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:17.307Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:22.308932 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:22.308Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:22.308932 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:22.308Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:27.309836 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:27.309Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:27.309836 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:27.309Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:32.310875 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:32.310Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:32.310875 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:32.310Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:37.311882 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:37.311Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:37.311882 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:37.311Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:42.312192 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:42.311Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:42.312192 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:42.311Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:47.313374 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:47.312Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:47.313374 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:47.312Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:52.315355 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:52.314Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:52.315355 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:52.314Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:57.315632 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:57.314Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:30:57.315632 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:30:57.315Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:02.316511 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:02.315Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:02.316511 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:02.315Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:07.316756 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:07.316Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:07.316756 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:07.316Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:12.317051 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:12.316Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:12.317051 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:12.316Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:17.318149 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:17.317Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:17.318149 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:17.317Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:22.318661 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:22.317Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:22.318661 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:22.317Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:27.319040 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:27.318Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:27.319040 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:27.318Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:32.319830 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:32.319Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:32.319830 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:32.319Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:37.320347 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:37.319Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:37.320347 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:37.319Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:42.321056 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:42.320Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:42.321056 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:42.320Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:42.821672 systemd[1]: Started sshd@45-136.144.54.115:22-85.209.11.27:60326.service - OpenSSH per-connection server daemon (85.209.11.27:60326). Jun 25 18:31:42.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-136.144.54.115:22-85.209.11.27:60326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:31:42.915594 kernel: audit: type=1130 audit(1719340302.820:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-136.144.54.115:22-85.209.11.27:60326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:31:44.733903 sshd[4973]: Invalid user anonymous from 85.209.11.27 port 60326 Jun 25 18:31:45.043033 sshd[4973]: Connection closed by invalid user anonymous 85.209.11.27 port 60326 [preauth] Jun 25 18:31:45.042000 audit[4973]: USER_ERR pid=4973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Jun 25 18:31:45.046031 systemd[1]: sshd@45-136.144.54.115:22-85.209.11.27:60326.service: Deactivated successfully. Jun 25 18:31:45.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-136.144.54.115:22-85.209.11.27:60326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:31:45.159812 kernel: audit: type=1109 audit(1719340305.042:328): pid=4973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Jun 25 18:31:45.159843 kernel: audit: type=1131 audit(1719340305.045:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-136.144.54.115:22-85.209.11.27:60326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:31:47.321364 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:47.320Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:47.321364 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:47.320Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:52.322548 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:52.321Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:52.322548 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:52.321Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:57.322735 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:57.322Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:31:57.322735 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:31:57.322Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:02.322921 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:02.322Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:02.322921 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:02.322Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:07.323266 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:07.322Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:07.323266 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:07.322Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:12.323582 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:12.322Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:12.323582 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:12.323Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:17.324311 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:17.323Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:17.324311 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:17.323Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:22.325735 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:22.325Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:22.325735 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:22.325Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:27.326803 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:27.326Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:27.326803 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:27.326Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:32.327291 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:32.326Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:32.327291 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:32.326Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:37.327536 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:37.326Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:37.327536 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:37.326Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:42.327964 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:42.327Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:42.327964 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:42.327Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:47.328465 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:47.327Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:47.328465 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:47.327Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:52.329191 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:52.328Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:52.329191 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:52.328Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:57.329874 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:57.329Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:32:57.329874 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:32:57.329Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:02.331128 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:02.330Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:02.331128 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:02.330Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:07.331920 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:07.331Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:07.331920 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:07.331Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:12.332785 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:12.332Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:12.332785 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:12.332Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:17.333064 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:17.332Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:17.333064 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:17.332Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:22.333666 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:22.332Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:22.333666 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:22.333Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:27.334271 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:27.333Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:27.334271 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:27.333Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:32.335144 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:32.334Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:32.335144 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:32.334Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:37.336176 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:37.335Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:37.336176 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:37.335Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:42.336313 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:42.335Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:42.336313 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:42.335Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:47.336917 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:47.336Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:47.336917 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:47.336Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:52.337204 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:52.336Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:52.337204 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:52.336Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:57.337844 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:57.337Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:33:57.337844 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:33:57.337Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:02.338541 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:02.337Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:02.338541 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:02.337Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:07.339167 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:07.338Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:07.339167 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:07.338Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:12.339380 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:12.338Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:12.339380 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:12.338Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:17.339935 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:17.339Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:17.339935 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:17.339Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:22.340821 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:22.340Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:22.340821 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:22.340Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:27.341481 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:27.340Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:27.341481 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:27.340Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:32.342099 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:32.341Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:32.342099 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:32.341Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:37.342194 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:37.341Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:37.342194 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:37.341Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:42.342751 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:42.342Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:42.342751 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:42.342Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:47.343064 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:47.342Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:47.343064 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:47.342Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:52.343996 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:52.342Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:52.343996 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:52.342Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:57.344441 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:57.343Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:34:57.344441 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:34:57.343Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:02.345521 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:02.344Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:02.345521 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:02.345Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:07.346065 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:07.345Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:07.346065 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:07.345Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:12.347005 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:12.346Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:12.347005 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:12.346Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:17.347311 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:17.346Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:17.347311 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:17.346Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:22.348560 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:22.347Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:22.348560 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:22.347Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:27.348755 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:27.348Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:27.348755 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:27.348Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:32.348983 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:32.348Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:32.348983 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:32.348Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:37.349463 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:37.348Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:37.349463 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:37.348Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:42.350665 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:42.350Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:42.350665 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:42.350Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:47.350890 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:47.350Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:47.350890 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:47.350Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:52.351534 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:52.350Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:52.351534 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:52.351Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:57.352752 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:57.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:35:57.352752 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:35:57.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:02.352987 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:02.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:02.352987 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:02.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:07.353352 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:07.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:07.353352 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:07.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:12.353907 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:12.353Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:12.353907 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:12.353Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:17.354201 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:17.353Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:17.354201 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:17.353Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:22.354577 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:22.353Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:22.354577 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:22.353Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:27.355462 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:27.354Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:27.355462 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:27.354Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:32.356260 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:32.355Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:32.356260 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:32.355Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:37.357349 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:37.356Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:37.357349 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:37.356Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:42.358156 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:42.357Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:42.358156 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:42.357Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:43.964265 systemd[1]: Started sshd@46-136.144.54.115:22-139.178.68.195:34854.service - OpenSSH per-connection server daemon (139.178.68.195:34854). Jun 25 18:36:43.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-136.144.54.115:22-139.178.68.195:34854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:36:43.989857 sshd[5345]: Accepted publickey for core from 139.178.68.195 port 34854 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:36:43.990629 sshd[5345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:36:43.993237 systemd-logind[1639]: New session 11 of user core. Jun 25 18:36:43.994017 systemd[1]: Started session-11.scope - Session 11 of User core. Jun 25 18:36:44.055176 sshd[5345]: pam_unix(sshd:session): session closed for user core Jun 25 18:36:44.056726 systemd[1]: sshd@46-136.144.54.115:22-139.178.68.195:34854.service: Deactivated successfully. Jun 25 18:36:44.057144 systemd[1]: session-11.scope: Deactivated successfully. Jun 25 18:36:44.057591 systemd-logind[1639]: Session 11 logged out. Waiting for processes to exit. Jun 25 18:36:44.058197 systemd-logind[1639]: Removed session 11. Jun 25 18:36:43.989000 audit[5345]: USER_ACCT pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.059461 kernel: audit: type=1130 audit(1719340603.963:330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-136.144.54.115:22-139.178.68.195:34854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:36:44.059497 kernel: audit: type=1101 audit(1719340603.989:331): pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:43.989000 audit[5345]: CRED_ACQ pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.179348 kernel: audit: type=1103 audit(1719340603.989:332): pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.261533 kernel: audit: type=1006 audit(1719340603.989:333): pid=5345 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jun 25 18:36:43.989000 audit[5345]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb3798070 a2=3 a3=7fb4b5d43480 items=0 ppid=1 pid=5345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:36:44.334441 kernel: audit: type=1300 audit(1719340603.989:333): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb3798070 a2=3 a3=7fb4b5d43480 items=0 ppid=1 pid=5345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:36:43.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:36:44.401456 kernel: audit: type=1327 audit(1719340603.989:333): proctitle=737368643A20636F7265205B707269765D Jun 25 18:36:43.994000 audit[5345]: USER_START pid=5345 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.463176 kernel: audit: type=1105 audit(1719340603.994:334): pid=5345 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:43.995000 audit[5347]: CRED_ACQ pid=5347 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.554031 kernel: audit: type=1103 audit(1719340603.995:335): pid=5347 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.055000 audit[5345]: USER_END pid=5345 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.650558 kernel: audit: type=1106 audit(1719340604.055:336): pid=5345 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.055000 audit[5345]: CRED_DISP pid=5345 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.741310 kernel: audit: type=1104 audit(1719340604.055:337): pid=5345 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:44.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-136.144.54.115:22-139.178.68.195:34854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:36:47.359292 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:47.358Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:47.359292 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:47.358Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:52.360739 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:52.359Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:52.360739 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:52.359Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:54.072537 systemd[1]: Started sshd@47-136.144.54.115:22-139.178.68.195:54702.service - OpenSSH per-connection server daemon (139.178.68.195:54702). Jun 25 18:36:54.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-136.144.54.115:22-139.178.68.195:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:36:54.077893 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:36:54.077931 kernel: audit: type=1130 audit(1719340614.071:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-136.144.54.115:22-139.178.68.195:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:36:54.098162 sshd[5376]: Accepted publickey for core from 139.178.68.195 port 54702 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:36:54.098902 sshd[5376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:36:54.101870 systemd-logind[1639]: New session 12 of user core. Jun 25 18:36:54.102524 systemd[1]: Started session-12.scope - Session 12 of User core. Jun 25 18:36:54.162067 sshd[5376]: pam_unix(sshd:session): session closed for user core Jun 25 18:36:54.163559 systemd[1]: sshd@47-136.144.54.115:22-139.178.68.195:54702.service: Deactivated successfully. Jun 25 18:36:54.163938 systemd[1]: session-12.scope: Deactivated successfully. Jun 25 18:36:54.164294 systemd-logind[1639]: Session 12 logged out. Waiting for processes to exit. Jun 25 18:36:54.164984 systemd-logind[1639]: Removed session 12. Jun 25 18:36:54.096000 audit[5376]: USER_ACCT pid=5376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.220165 kernel: audit: type=1101 audit(1719340614.096:340): pid=5376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.097000 audit[5376]: CRED_ACQ pid=5376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.286387 kernel: audit: type=1103 audit(1719340614.097:341): pid=5376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.393211 kernel: audit: type=1006 audit(1719340614.097:342): pid=5376 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Jun 25 18:36:54.097000 audit[5376]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe8916ad0 a2=3 a3=7f04ef143480 items=0 ppid=1 pid=5376 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:36:54.465103 kernel: audit: type=1300 audit(1719340614.097:342): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe8916ad0 a2=3 a3=7f04ef143480 items=0 ppid=1 pid=5376 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:36:54.097000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:36:54.530461 kernel: audit: type=1327 audit(1719340614.097:342): proctitle=737368643A20636F7265205B707269765D Jun 25 18:36:54.103000 audit[5376]: USER_START pid=5376 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.591623 kernel: audit: type=1105 audit(1719340614.103:343): pid=5376 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.104000 audit[5378]: CRED_ACQ pid=5378 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.680902 kernel: audit: type=1103 audit(1719340614.104:344): pid=5378 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.161000 audit[5376]: USER_END pid=5376 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.775963 kernel: audit: type=1106 audit(1719340614.161:345): pid=5376 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.161000 audit[5376]: CRED_DISP pid=5376 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.865311 kernel: audit: type=1104 audit(1719340614.161:346): pid=5376 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:36:54.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-136.144.54.115:22-139.178.68.195:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:36:57.361208 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:57.360Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:36:57.361208 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:36:57.360Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:02.362490 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:02.361Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:02.362490 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:02.361Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:04.188417 systemd[1]: Started sshd@48-136.144.54.115:22-139.178.68.195:34062.service - OpenSSH per-connection server daemon (139.178.68.195:34062). Jun 25 18:37:04.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-136.144.54.115:22-139.178.68.195:34062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:04.194111 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:37:04.194142 kernel: audit: type=1130 audit(1719340624.187:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-136.144.54.115:22-139.178.68.195:34062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:04.217936 sshd[5408]: Accepted publickey for core from 139.178.68.195 port 34062 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:37:04.218646 sshd[5408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:37:04.221323 systemd-logind[1639]: New session 13 of user core. Jun 25 18:37:04.222009 systemd[1]: Started session-13.scope - Session 13 of User core. Jun 25 18:37:04.216000 audit[5408]: USER_ACCT pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.306540 kernel: audit: type=1101 audit(1719340624.216:349): pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.311016 sshd[5408]: pam_unix(sshd:session): session closed for user core Jun 25 18:37:04.312596 systemd[1]: sshd@48-136.144.54.115:22-139.178.68.195:34062.service: Deactivated successfully. Jun 25 18:37:04.312973 systemd[1]: session-13.scope: Deactivated successfully. Jun 25 18:37:04.313316 systemd-logind[1639]: Session 13 logged out. Waiting for processes to exit. Jun 25 18:37:04.313999 systemd-logind[1639]: Removed session 13. Jun 25 18:37:04.217000 audit[5408]: CRED_ACQ pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.424616 kernel: audit: type=1103 audit(1719340624.217:350): pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.504528 kernel: audit: type=1006 audit(1719340624.217:351): pid=5408 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jun 25 18:37:04.217000 audit[5408]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca27a36a0 a2=3 a3=7f3cac7b2480 items=0 ppid=1 pid=5408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:04.575927 kernel: audit: type=1300 audit(1719340624.217:351): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca27a36a0 a2=3 a3=7f3cac7b2480 items=0 ppid=1 pid=5408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:04.217000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:04.649334 kernel: audit: type=1327 audit(1719340624.217:351): proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:04.223000 audit[5408]: USER_START pid=5408 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.701515 kernel: audit: type=1105 audit(1719340624.223:352): pid=5408 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.223000 audit[5411]: CRED_ACQ pid=5411 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.789947 kernel: audit: type=1103 audit(1719340624.223:353): pid=5411 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.310000 audit[5408]: USER_END pid=5408 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.854466 kernel: audit: type=1106 audit(1719340624.310:354): pid=5408 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.310000 audit[5408]: CRED_DISP pid=5408 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.974469 kernel: audit: type=1104 audit(1719340624.310:355): pid=5408 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:04.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-136.144.54.115:22-139.178.68.195:34062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:07.363419 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:07.362Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:07.363419 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:07.362Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:12.363686 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:12.363Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:12.363686 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:12.363Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:14.343772 systemd[1]: Started sshd@49-136.144.54.115:22-139.178.68.195:49240.service - OpenSSH per-connection server daemon (139.178.68.195:49240). Jun 25 18:37:14.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-136.144.54.115:22-139.178.68.195:49240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:14.349070 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:37:14.349139 kernel: audit: type=1130 audit(1719340634.342:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-136.144.54.115:22-139.178.68.195:49240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:14.369352 sshd[5441]: Accepted publickey for core from 139.178.68.195 port 49240 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:37:14.370005 sshd[5441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:37:14.372703 systemd-logind[1639]: New session 14 of user core. Jun 25 18:37:14.373213 systemd[1]: Started session-14.scope - Session 14 of User core. Jun 25 18:37:14.429898 sshd[5441]: pam_unix(sshd:session): session closed for user core Jun 25 18:37:14.431421 systemd[1]: sshd@49-136.144.54.115:22-139.178.68.195:49240.service: Deactivated successfully. Jun 25 18:37:14.432045 systemd[1]: session-14.scope: Deactivated successfully. Jun 25 18:37:14.432369 systemd-logind[1639]: Session 14 logged out. Waiting for processes to exit. Jun 25 18:37:14.433072 systemd-logind[1639]: Removed session 14. Jun 25 18:37:14.367000 audit[5441]: USER_ACCT pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.488528 kernel: audit: type=1101 audit(1719340634.367:358): pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.368000 audit[5441]: CRED_ACQ pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.578317 kernel: audit: type=1103 audit(1719340634.368:359): pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.658244 kernel: audit: type=1006 audit(1719340634.368:360): pid=5441 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jun 25 18:37:14.368000 audit[5441]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe53c5aba0 a2=3 a3=7fe6dae8a480 items=0 ppid=1 pid=5441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:14.729657 kernel: audit: type=1300 audit(1719340634.368:360): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe53c5aba0 a2=3 a3=7fe6dae8a480 items=0 ppid=1 pid=5441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:14.368000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:14.802964 kernel: audit: type=1327 audit(1719340634.368:360): proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:14.374000 audit[5441]: USER_START pid=5441 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.855132 kernel: audit: type=1105 audit(1719340634.374:361): pid=5441 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.374000 audit[5444]: CRED_ACQ pid=5444 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.943561 kernel: audit: type=1103 audit(1719340634.374:362): pid=5444 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.428000 audit[5441]: USER_END pid=5441 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:15.038570 kernel: audit: type=1106 audit(1719340634.428:363): pid=5441 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.429000 audit[5441]: CRED_DISP pid=5441 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:15.127901 kernel: audit: type=1104 audit(1719340634.429:364): pid=5441 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:14.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-136.144.54.115:22-139.178.68.195:49240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:17.363933 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:17.363Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:17.363933 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:17.363Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:22.364520 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:22.363Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:22.364520 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:22.364Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:24.447025 systemd[1]: Started sshd@50-136.144.54.115:22-139.178.68.195:55990.service - OpenSSH per-connection server daemon (139.178.68.195:55990). Jun 25 18:37:24.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-136.144.54.115:22-139.178.68.195:55990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:24.452314 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:37:24.452346 kernel: audit: type=1130 audit(1719340644.446:366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-136.144.54.115:22-139.178.68.195:55990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:24.472440 sshd[5474]: Accepted publickey for core from 139.178.68.195 port 55990 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:37:24.473119 sshd[5474]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:37:24.475742 systemd-logind[1639]: New session 15 of user core. Jun 25 18:37:24.476237 systemd[1]: Started session-15.scope - Session 15 of User core. Jun 25 18:37:24.534901 sshd[5474]: pam_unix(sshd:session): session closed for user core Jun 25 18:37:24.536563 systemd[1]: sshd@50-136.144.54.115:22-139.178.68.195:55990.service: Deactivated successfully. Jun 25 18:37:24.536995 systemd[1]: session-15.scope: Deactivated successfully. Jun 25 18:37:24.537371 systemd-logind[1639]: Session 15 logged out. Waiting for processes to exit. Jun 25 18:37:24.538037 systemd-logind[1639]: Removed session 15. Jun 25 18:37:24.471000 audit[5474]: USER_ACCT pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:24.591848 kernel: audit: type=1101 audit(1719340644.471:367): pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:24.472000 audit[5474]: CRED_ACQ pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:24.655404 kernel: audit: type=1103 audit(1719340644.472:368): pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:24.761570 kernel: audit: type=1006 audit(1719340644.472:369): pid=5474 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jun 25 18:37:24.472000 audit[5474]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea47b3190 a2=3 a3=7fdad17e5480 items=0 ppid=1 pid=5474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:24.832956 kernel: audit: type=1300 audit(1719340644.472:369): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea47b3190 a2=3 a3=7fdad17e5480 items=0 ppid=1 pid=5474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:24.472000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:24.906338 kernel: audit: type=1327 audit(1719340644.472:369): proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:24.478000 audit[5474]: USER_START pid=5474 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:24.958496 kernel: audit: type=1105 audit(1719340644.478:370): pid=5474 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:24.478000 audit[5476]: CRED_ACQ pid=5476 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:25.022387 kernel: audit: type=1103 audit(1719340644.478:371): pid=5476 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:24.535000 audit[5474]: USER_END pid=5474 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:25.142178 kernel: audit: type=1106 audit(1719340644.535:372): pid=5474 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:24.535000 audit[5474]: CRED_DISP pid=5474 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:25.231540 kernel: audit: type=1104 audit(1719340644.535:373): pid=5474 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:24.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-136.144.54.115:22-139.178.68.195:55990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:27.365208 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:27.364Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:27.365208 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:27.364Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:32.366372 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:32.365Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:32.366372 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:32.365Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:34.555744 systemd[1]: Started sshd@51-136.144.54.115:22-139.178.68.195:56898.service - OpenSSH per-connection server daemon (139.178.68.195:56898). Jun 25 18:37:34.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-136.144.54.115:22-139.178.68.195:56898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:34.561058 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:37:34.561092 kernel: audit: type=1130 audit(1719340654.555:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-136.144.54.115:22-139.178.68.195:56898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:34.581342 sshd[5504]: Accepted publickey for core from 139.178.68.195 port 56898 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:37:34.582070 sshd[5504]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:37:34.584823 systemd-logind[1639]: New session 16 of user core. Jun 25 18:37:34.585425 systemd[1]: Started session-16.scope - Session 16 of User core. Jun 25 18:37:34.580000 audit[5504]: USER_ACCT pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:34.700946 kernel: audit: type=1101 audit(1719340654.580:376): pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:34.740119 sshd[5504]: pam_unix(sshd:session): session closed for user core Jun 25 18:37:34.741696 systemd[1]: sshd@51-136.144.54.115:22-139.178.68.195:56898.service: Deactivated successfully. Jun 25 18:37:34.742109 systemd[1]: session-16.scope: Deactivated successfully. Jun 25 18:37:34.742384 systemd-logind[1639]: Session 16 logged out. Waiting for processes to exit. Jun 25 18:37:34.743041 systemd-logind[1639]: Removed session 16. Jun 25 18:37:34.581000 audit[5504]: CRED_ACQ pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:34.765474 kernel: audit: type=1103 audit(1719340654.581:377): pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:34.870643 kernel: audit: type=1006 audit(1719340654.581:378): pid=5504 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jun 25 18:37:34.581000 audit[5504]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee09d5590 a2=3 a3=7fb8aff12480 items=0 ppid=1 pid=5504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:34.942009 kernel: audit: type=1300 audit(1719340654.581:378): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee09d5590 a2=3 a3=7fb8aff12480 items=0 ppid=1 pid=5504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:34.581000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:35.006464 kernel: audit: type=1327 audit(1719340654.581:378): proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:34.587000 audit[5504]: USER_START pid=5504 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:35.067368 kernel: audit: type=1105 audit(1719340654.587:379): pid=5504 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:34.588000 audit[5507]: CRED_ACQ pid=5507 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:35.155770 kernel: audit: type=1103 audit(1719340654.588:380): pid=5507 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:34.740000 audit[5504]: USER_END pid=5504 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:35.250718 kernel: audit: type=1106 audit(1719340654.740:381): pid=5504 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:34.740000 audit[5504]: CRED_DISP pid=5504 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:35.339981 kernel: audit: type=1104 audit(1719340654.740:382): pid=5504 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:34.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-136.144.54.115:22-139.178.68.195:56898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:37.367373 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:37.366Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:37.367373 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:37.366Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:42.367564 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:42.366Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:42.367564 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:42.366Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:44.763745 systemd[1]: Started sshd@52-136.144.54.115:22-139.178.68.195:33062.service - OpenSSH per-connection server daemon (139.178.68.195:33062). Jun 25 18:37:44.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-136.144.54.115:22-139.178.68.195:33062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:44.769047 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:37:44.769080 kernel: audit: type=1130 audit(1719340664.763:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-136.144.54.115:22-139.178.68.195:33062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:44.896000 audit[5536]: USER_ACCT pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:44.897031 sshd[5536]: Accepted publickey for core from 139.178.68.195 port 33062 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:37:44.898667 sshd[5536]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:37:44.904762 systemd-logind[1639]: New session 17 of user core. Jun 25 18:37:44.906219 systemd[1]: Started session-17.scope - Session 17 of User core. Jun 25 18:37:44.897000 audit[5536]: CRED_ACQ pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.015879 kernel: audit: type=1101 audit(1719340664.896:385): pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.015912 kernel: audit: type=1103 audit(1719340664.897:386): pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.096913 kernel: audit: type=1006 audit(1719340664.897:387): pid=5536 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jun 25 18:37:44.897000 audit[5536]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5354e560 a2=3 a3=7f758eb3c480 items=0 ppid=1 pid=5536 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:45.139783 sshd[5536]: pam_unix(sshd:session): session closed for user core Jun 25 18:37:45.140389 kernel: audit: type=1300 audit(1719340664.897:387): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5354e560 a2=3 a3=7f758eb3c480 items=0 ppid=1 pid=5536 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:45.141236 systemd[1]: sshd@52-136.144.54.115:22-139.178.68.195:33062.service: Deactivated successfully. Jun 25 18:37:45.141637 systemd[1]: session-17.scope: Deactivated successfully. Jun 25 18:37:45.142052 systemd-logind[1639]: Session 17 logged out. Waiting for processes to exit. Jun 25 18:37:45.142722 systemd-logind[1639]: Removed session 17. Jun 25 18:37:45.232388 kernel: audit: type=1327 audit(1719340664.897:387): proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:44.897000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:44.912000 audit[5536]: USER_START pid=5536 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.293752 kernel: audit: type=1105 audit(1719340664.912:388): pid=5536 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:44.914000 audit[5538]: CRED_ACQ pid=5538 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.382103 kernel: audit: type=1103 audit(1719340664.914:389): pid=5538 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.140000 audit[5536]: USER_END pid=5536 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.446443 kernel: audit: type=1106 audit(1719340665.140:390): pid=5536 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.140000 audit[5536]: CRED_DISP pid=5536 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.566380 kernel: audit: type=1104 audit(1719340665.140:391): pid=5536 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:45.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-136.144.54.115:22-139.178.68.195:33062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:47.367843 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:47.367Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:47.367843 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:47.367Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:52.368108 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:52.367Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:52.368108 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:52.367Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:55.124754 systemd[1]: Started sshd@53-136.144.54.115:22-139.178.68.195:49684.service - OpenSSH per-connection server daemon (139.178.68.195:49684). Jun 25 18:37:55.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-136.144.54.115:22-139.178.68.195:49684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:55.130060 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:37:55.130127 kernel: audit: type=1130 audit(1719340675.124:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-136.144.54.115:22-139.178.68.195:49684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:55.150740 sshd[5565]: Accepted publickey for core from 139.178.68.195 port 49684 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:37:55.151503 sshd[5565]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:37:55.154100 systemd-logind[1639]: New session 18 of user core. Jun 25 18:37:55.154636 systemd[1]: Started session-18.scope - Session 18 of User core. Jun 25 18:37:55.214934 sshd[5565]: pam_unix(sshd:session): session closed for user core Jun 25 18:37:55.216443 systemd[1]: sshd@53-136.144.54.115:22-139.178.68.195:49684.service: Deactivated successfully. Jun 25 18:37:55.216865 systemd[1]: session-18.scope: Deactivated successfully. Jun 25 18:37:55.217235 systemd-logind[1639]: Session 18 logged out. Waiting for processes to exit. Jun 25 18:37:55.217956 systemd-logind[1639]: Removed session 18. Jun 25 18:37:55.242450 kernel: audit: type=1101 audit(1719340675.149:394): pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.149000 audit[5565]: USER_ACCT pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.149000 audit[5565]: CRED_ACQ pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.359970 kernel: audit: type=1103 audit(1719340675.149:395): pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.440029 kernel: audit: type=1006 audit(1719340675.149:396): pid=5565 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jun 25 18:37:55.149000 audit[5565]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde8cc8150 a2=3 a3=7fb52f3f4480 items=0 ppid=1 pid=5565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:55.511536 kernel: audit: type=1300 audit(1719340675.149:396): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde8cc8150 a2=3 a3=7fb52f3f4480 items=0 ppid=1 pid=5565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:37:55.149000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:55.584880 kernel: audit: type=1327 audit(1719340675.149:396): proctitle=737368643A20636F7265205B707269765D Jun 25 18:37:55.155000 audit[5565]: USER_START pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.637039 kernel: audit: type=1105 audit(1719340675.155:397): pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.156000 audit[5567]: CRED_ACQ pid=5567 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.726965 kernel: audit: type=1103 audit(1719340675.156:398): pid=5567 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.214000 audit[5565]: USER_END pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.824151 kernel: audit: type=1106 audit(1719340675.214:399): pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.214000 audit[5565]: CRED_DISP pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.914536 kernel: audit: type=1104 audit(1719340675.214:400): pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:37:55.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-136.144.54.115:22-139.178.68.195:49684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:37:57.368322 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:57.367Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:37:57.368322 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:37:57.367Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:02.369061 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:02.368Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:02.369061 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:02.368Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:05.233054 systemd[1]: Started sshd@54-136.144.54.115:22-139.178.68.195:46884.service - OpenSSH per-connection server daemon (139.178.68.195:46884). Jun 25 18:38:05.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-136.144.54.115:22-139.178.68.195:46884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:05.238466 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:38:05.238545 kernel: audit: type=1130 audit(1719340685.231:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-136.144.54.115:22-139.178.68.195:46884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:05.258786 sshd[5596]: Accepted publickey for core from 139.178.68.195 port 46884 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:38:05.259548 sshd[5596]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:38:05.262238 systemd-logind[1639]: New session 19 of user core. Jun 25 18:38:05.262840 systemd[1]: Started session-19.scope - Session 19 of User core. Jun 25 18:38:05.257000 audit[5596]: USER_ACCT pid=5596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.378472 kernel: audit: type=1101 audit(1719340685.257:403): pid=5596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.257000 audit[5596]: CRED_ACQ pid=5596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.442456 kernel: audit: type=1103 audit(1719340685.257:404): pid=5596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.443960 sshd[5596]: pam_unix(sshd:session): session closed for user core Jun 25 18:38:05.445541 systemd[1]: sshd@54-136.144.54.115:22-139.178.68.195:46884.service: Deactivated successfully. Jun 25 18:38:05.445928 systemd[1]: session-19.scope: Deactivated successfully. Jun 25 18:38:05.446307 systemd-logind[1639]: Session 19 logged out. Waiting for processes to exit. Jun 25 18:38:05.446987 systemd-logind[1639]: Removed session 19. Jun 25 18:38:05.548298 kernel: audit: type=1006 audit(1719340685.257:405): pid=5596 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Jun 25 18:38:05.257000 audit[5596]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd91a1aa40 a2=3 a3=7f8b878b9480 items=0 ppid=1 pid=5596 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:05.619705 kernel: audit: type=1300 audit(1719340685.257:405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd91a1aa40 a2=3 a3=7f8b878b9480 items=0 ppid=1 pid=5596 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:05.257000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:05.693045 kernel: audit: type=1327 audit(1719340685.257:405): proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:05.263000 audit[5596]: USER_START pid=5596 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.745204 kernel: audit: type=1105 audit(1719340685.263:406): pid=5596 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.264000 audit[5598]: CRED_ACQ pid=5598 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.833649 kernel: audit: type=1103 audit(1719340685.264:407): pid=5598 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.443000 audit[5596]: USER_END pid=5596 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.928721 kernel: audit: type=1106 audit(1719340685.443:408): pid=5596 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.443000 audit[5596]: CRED_DISP pid=5596 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:06.018095 kernel: audit: type=1104 audit(1719340685.443:409): pid=5596 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:05.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-136.144.54.115:22-139.178.68.195:46884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:07.369927 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:07.369Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:07.369927 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:07.369Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:12.371078 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:12.370Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:12.371078 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:12.370Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:15.468037 systemd[1]: Started sshd@55-136.144.54.115:22-139.178.68.195:59780.service - OpenSSH per-connection server daemon (139.178.68.195:59780). Jun 25 18:38:15.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-136.144.54.115:22-139.178.68.195:59780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:15.473319 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:38:15.473393 kernel: audit: type=1130 audit(1719340695.466:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-136.144.54.115:22-139.178.68.195:59780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:15.493743 sshd[5629]: Accepted publickey for core from 139.178.68.195 port 59780 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:38:15.494376 sshd[5629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:38:15.497065 systemd-logind[1639]: New session 20 of user core. Jun 25 18:38:15.497664 systemd[1]: Started session-20.scope - Session 20 of User core. Jun 25 18:38:15.492000 audit[5629]: USER_ACCT pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:15.585483 kernel: audit: type=1101 audit(1719340695.492:412): pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:15.591037 sshd[5629]: pam_unix(sshd:session): session closed for user core Jun 25 18:38:15.592555 systemd[1]: sshd@55-136.144.54.115:22-139.178.68.195:59780.service: Deactivated successfully. Jun 25 18:38:15.592943 systemd[1]: session-20.scope: Deactivated successfully. Jun 25 18:38:15.593269 systemd-logind[1639]: Session 20 logged out. Waiting for processes to exit. Jun 25 18:38:15.593923 systemd-logind[1639]: Removed session 20. Jun 25 18:38:15.492000 audit[5629]: CRED_ACQ pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:15.678486 kernel: audit: type=1103 audit(1719340695.492:413): pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:15.784472 kernel: audit: type=1006 audit(1719340695.492:414): pid=5629 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Jun 25 18:38:15.492000 audit[5629]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff90e64f80 a2=3 a3=7f33211e1480 items=0 ppid=1 pid=5629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:15.855901 kernel: audit: type=1300 audit(1719340695.492:414): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff90e64f80 a2=3 a3=7f33211e1480 items=0 ppid=1 pid=5629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:15.492000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:15.929265 kernel: audit: type=1327 audit(1719340695.492:414): proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:15.498000 audit[5629]: USER_START pid=5629 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:15.951472 kernel: audit: type=1105 audit(1719340695.498:415): pid=5629 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:15.499000 audit[5631]: CRED_ACQ pid=5631 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:16.069927 kernel: audit: type=1103 audit(1719340695.499:416): pid=5631 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:15.590000 audit[5629]: USER_END pid=5629 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:16.165003 kernel: audit: type=1106 audit(1719340695.590:417): pid=5629 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:15.590000 audit[5629]: CRED_DISP pid=5629 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:16.254464 kernel: audit: type=1104 audit(1719340695.590:418): pid=5629 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:15.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-136.144.54.115:22-139.178.68.195:59780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:17.372074 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:17.371Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:17.372074 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:17.371Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:22.372241 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:22.371Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:22.372241 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:22.371Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:25.240777 systemd[1]: Started sshd@56-136.144.54.115:22-205.210.31.251:52108.service - OpenSSH per-connection server daemon (205.210.31.251:52108). Jun 25 18:38:25.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-136.144.54.115:22-205.210.31.251:52108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:25.246053 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:38:25.246081 kernel: audit: type=1130 audit(1719340705.239:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-136.144.54.115:22-205.210.31.251:52108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:25.502091 sshd[5658]: Connection closed by 205.210.31.251 port 52108 Jun 25 18:38:25.503652 systemd[1]: sshd@56-136.144.54.115:22-205.210.31.251:52108.service: Deactivated successfully. Jun 25 18:38:25.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-136.144.54.115:22-205.210.31.251:52108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:25.594592 kernel: audit: type=1131 audit(1719340705.502:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-136.144.54.115:22-205.210.31.251:52108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:25.605546 systemd[1]: Started sshd@57-136.144.54.115:22-139.178.68.195:47128.service - OpenSSH per-connection server daemon (139.178.68.195:47128). Jun 25 18:38:25.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-136.144.54.115:22-139.178.68.195:47128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:25.631177 sshd[5661]: Accepted publickey for core from 139.178.68.195 port 47128 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:38:25.631867 sshd[5661]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:38:25.634331 systemd-logind[1639]: New session 21 of user core. Jun 25 18:38:25.634953 systemd[1]: Started session-21.scope - Session 21 of User core. Jun 25 18:38:25.693597 sshd[5661]: pam_unix(sshd:session): session closed for user core Jun 25 18:38:25.695141 systemd[1]: sshd@57-136.144.54.115:22-139.178.68.195:47128.service: Deactivated successfully. Jun 25 18:38:25.695581 systemd[1]: session-21.scope: Deactivated successfully. Jun 25 18:38:25.695985 systemd-logind[1639]: Session 21 logged out. Waiting for processes to exit. Jun 25 18:38:25.696484 systemd-logind[1639]: Removed session 21. Jun 25 18:38:25.629000 audit[5661]: USER_ACCT pid=5661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:25.724550 kernel: audit: type=1130 audit(1719340705.604:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-136.144.54.115:22-139.178.68.195:47128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:25.724577 kernel: audit: type=1101 audit(1719340705.629:423): pid=5661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:25.630000 audit[5661]: CRED_ACQ pid=5661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:25.816122 kernel: audit: type=1103 audit(1719340705.630:424): pid=5661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:25.895989 kernel: audit: type=1006 audit(1719340705.630:425): pid=5661 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Jun 25 18:38:25.630000 audit[5661]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0689e5a0 a2=3 a3=7f3ee842c480 items=0 ppid=1 pid=5661 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:25.967297 kernel: audit: type=1300 audit(1719340705.630:425): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0689e5a0 a2=3 a3=7f3ee842c480 items=0 ppid=1 pid=5661 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:25.630000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:26.041173 kernel: audit: type=1327 audit(1719340705.630:425): proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:25.635000 audit[5661]: USER_START pid=5661 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:26.093598 kernel: audit: type=1105 audit(1719340705.635:426): pid=5661 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:25.636000 audit[5663]: CRED_ACQ pid=5663 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:26.182860 kernel: audit: type=1103 audit(1719340705.636:427): pid=5663 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:25.692000 audit[5661]: USER_END pid=5661 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:25.692000 audit[5661]: CRED_DISP pid=5661 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:25.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-136.144.54.115:22-139.178.68.195:47128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:27.372432 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:27.371Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:27.372432 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:27.371Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:32.373004 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:32.372Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:32.373004 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:32.372Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:35.717765 systemd[1]: Started sshd@58-136.144.54.115:22-139.178.68.195:53750.service - OpenSSH per-connection server daemon (139.178.68.195:53750). Jun 25 18:38:35.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-136.144.54.115:22-139.178.68.195:53750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:35.723059 kernel: kauditd_printk_skb: 3 callbacks suppressed Jun 25 18:38:35.723088 kernel: audit: type=1130 audit(1719340715.717:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-136.144.54.115:22-139.178.68.195:53750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:35.743313 sshd[5693]: Accepted publickey for core from 139.178.68.195 port 53750 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:38:35.743946 sshd[5693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:38:35.746412 systemd-logind[1639]: New session 22 of user core. Jun 25 18:38:35.746934 systemd[1]: Started session-22.scope - Session 22 of User core. Jun 25 18:38:35.804994 sshd[5693]: pam_unix(sshd:session): session closed for user core Jun 25 18:38:35.806393 systemd[1]: sshd@58-136.144.54.115:22-139.178.68.195:53750.service: Deactivated successfully. Jun 25 18:38:35.806826 systemd[1]: session-22.scope: Deactivated successfully. Jun 25 18:38:35.807221 systemd-logind[1639]: Session 22 logged out. Waiting for processes to exit. Jun 25 18:38:35.807940 systemd-logind[1639]: Removed session 22. Jun 25 18:38:35.742000 audit[5693]: USER_ACCT pid=5693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:35.862724 kernel: audit: type=1101 audit(1719340715.742:432): pid=5693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:35.743000 audit[5693]: CRED_ACQ pid=5693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:35.952409 kernel: audit: type=1103 audit(1719340715.743:433): pid=5693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:36.032218 kernel: audit: type=1006 audit(1719340715.743:434): pid=5693 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jun 25 18:38:35.743000 audit[5693]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbe85ea90 a2=3 a3=7fec30fb5480 items=0 ppid=1 pid=5693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:36.103542 kernel: audit: type=1300 audit(1719340715.743:434): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbe85ea90 a2=3 a3=7fec30fb5480 items=0 ppid=1 pid=5693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:35.743000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:36.168473 kernel: audit: type=1327 audit(1719340715.743:434): proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:35.748000 audit[5693]: USER_START pid=5693 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:36.198454 kernel: audit: type=1105 audit(1719340715.748:435): pid=5693 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:35.749000 audit[5695]: CRED_ACQ pid=5695 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:36.293460 kernel: audit: type=1103 audit(1719340715.749:436): pid=5695 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:35.805000 audit[5693]: USER_END pid=5693 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:36.383462 kernel: audit: type=1106 audit(1719340715.805:437): pid=5693 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:35.805000 audit[5693]: CRED_DISP pid=5693 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:36.504597 kernel: audit: type=1104 audit(1719340715.805:438): pid=5693 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:35.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-136.144.54.115:22-139.178.68.195:53750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:37.373795 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:37.373Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:37.373795 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:37.373Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:42.374328 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:42.373Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:42.374328 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:42.373Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:45.831750 systemd[1]: Started sshd@59-136.144.54.115:22-139.178.68.195:44652.service - OpenSSH per-connection server daemon (139.178.68.195:44652). Jun 25 18:38:45.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-136.144.54.115:22-139.178.68.195:44652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:45.837051 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:38:45.837126 kernel: audit: type=1130 audit(1719340725.831:440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-136.144.54.115:22-139.178.68.195:44652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:45.857271 sshd[5721]: Accepted publickey for core from 139.178.68.195 port 44652 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:38:45.857927 sshd[5721]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:38:45.860798 systemd-logind[1639]: New session 23 of user core. Jun 25 18:38:45.861232 systemd[1]: Started session-23.scope - Session 23 of User core. Jun 25 18:38:45.856000 audit[5721]: USER_ACCT pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:45.977321 kernel: audit: type=1101 audit(1719340725.856:441): pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.039528 sshd[5721]: pam_unix(sshd:session): session closed for user core Jun 25 18:38:45.857000 audit[5721]: CRED_ACQ pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.041060 systemd[1]: sshd@59-136.144.54.115:22-139.178.68.195:44652.service: Deactivated successfully. Jun 25 18:38:46.041388 kernel: audit: type=1103 audit(1719340725.857:442): pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.041470 systemd[1]: session-23.scope: Deactivated successfully. Jun 25 18:38:46.041852 systemd-logind[1639]: Session 23 logged out. Waiting for processes to exit. Jun 25 18:38:46.042366 systemd-logind[1639]: Removed session 23. Jun 25 18:38:46.145986 kernel: audit: type=1006 audit(1719340725.857:443): pid=5721 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jun 25 18:38:45.857000 audit[5721]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd02eff580 a2=3 a3=7eff35707480 items=0 ppid=1 pid=5721 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:46.216837 kernel: audit: type=1300 audit(1719340725.857:443): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd02eff580 a2=3 a3=7eff35707480 items=0 ppid=1 pid=5721 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:45.857000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:46.281454 kernel: audit: type=1327 audit(1719340725.857:443): proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:45.863000 audit[5721]: USER_START pid=5721 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.342149 kernel: audit: type=1105 audit(1719340725.863:444): pid=5721 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:45.864000 audit[5723]: CRED_ACQ pid=5723 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.430642 kernel: audit: type=1103 audit(1719340725.864:445): pid=5723 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.039000 audit[5721]: USER_END pid=5721 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.525665 kernel: audit: type=1106 audit(1719340726.039:446): pid=5721 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.039000 audit[5721]: CRED_DISP pid=5721 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.615041 kernel: audit: type=1104 audit(1719340726.039:447): pid=5721 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:46.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-136.144.54.115:22-139.178.68.195:44652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:47.374600 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:47.373Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:47.374600 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:47.374Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:52.375916 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:52.375Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:52.375916 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:52.375Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:56.060723 systemd[1]: Started sshd@60-136.144.54.115:22-139.178.68.195:46968.service - OpenSSH per-connection server daemon (139.178.68.195:46968). Jun 25 18:38:56.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-136.144.54.115:22-139.178.68.195:46968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:56.066085 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:38:56.066132 kernel: audit: type=1130 audit(1719340736.059:449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-136.144.54.115:22-139.178.68.195:46968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:56.086174 sshd[5754]: Accepted publickey for core from 139.178.68.195 port 46968 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:38:56.086812 sshd[5754]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:38:56.089622 systemd-logind[1639]: New session 24 of user core. Jun 25 18:38:56.090111 systemd[1]: Started session-24.scope - Session 24 of User core. Jun 25 18:38:56.150670 sshd[5754]: pam_unix(sshd:session): session closed for user core Jun 25 18:38:56.152209 systemd[1]: sshd@60-136.144.54.115:22-139.178.68.195:46968.service: Deactivated successfully. Jun 25 18:38:56.152778 systemd[1]: session-24.scope: Deactivated successfully. Jun 25 18:38:56.153251 systemd-logind[1639]: Session 24 logged out. Waiting for processes to exit. Jun 25 18:38:56.153980 systemd-logind[1639]: Removed session 24. Jun 25 18:38:56.084000 audit[5754]: USER_ACCT pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.205471 kernel: audit: type=1101 audit(1719340736.084:450): pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.085000 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.295248 kernel: audit: type=1103 audit(1719340736.085:451): pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.375143 kernel: audit: type=1006 audit(1719340736.085:452): pid=5754 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jun 25 18:38:56.085000 audit[5754]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde6fff50 a2=3 a3=7f10e4f94480 items=0 ppid=1 pid=5754 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:56.446524 kernel: audit: type=1300 audit(1719340736.085:452): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde6fff50 a2=3 a3=7f10e4f94480 items=0 ppid=1 pid=5754 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:38:56.085000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:56.519944 kernel: audit: type=1327 audit(1719340736.085:452): proctitle=737368643A20636F7265205B707269765D Jun 25 18:38:56.091000 audit[5754]: USER_START pid=5754 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.572082 kernel: audit: type=1105 audit(1719340736.091:453): pid=5754 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.091000 audit[5756]: CRED_ACQ pid=5756 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.660476 kernel: audit: type=1103 audit(1719340736.091:454): pid=5756 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.150000 audit[5754]: USER_END pid=5754 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.755515 kernel: audit: type=1106 audit(1719340736.150:455): pid=5754 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.150000 audit[5754]: CRED_DISP pid=5754 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.844821 kernel: audit: type=1104 audit(1719340736.150:456): pid=5754 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:38:56.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-136.144.54.115:22-139.178.68.195:46968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:38:57.376351 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:57.375Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:38:57.376351 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:38:57.375Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:39:02.377219 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:39:02.376Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:39:02.377219 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:39:02.376Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:39:06.173595 systemd[1]: Started sshd@61-136.144.54.115:22-139.178.68.195:59460.service - OpenSSH per-connection server daemon (139.178.68.195:59460). Jun 25 18:39:06.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-136.144.54.115:22-139.178.68.195:59460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:39:06.178904 kernel: kauditd_printk_skb: 1 callbacks suppressed Jun 25 18:39:06.178976 kernel: audit: type=1130 audit(1719340746.172:458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-136.144.54.115:22-139.178.68.195:59460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:39:06.199429 sshd[5786]: Accepted publickey for core from 139.178.68.195 port 59460 ssh2: RSA SHA256:x9f7MvMITM7sk37E4vCMutbDv75B5BE8YUmOBgFQtMA Jun 25 18:39:06.200066 sshd[5786]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jun 25 18:39:06.203053 systemd-logind[1639]: New session 25 of user core. Jun 25 18:39:06.203650 systemd[1]: Started session-25.scope - Session 25 of User core. Jun 25 18:39:06.263608 sshd[5786]: pam_unix(sshd:session): session closed for user core Jun 25 18:39:06.265149 systemd[1]: sshd@61-136.144.54.115:22-139.178.68.195:59460.service: Deactivated successfully. Jun 25 18:39:06.265584 systemd[1]: session-25.scope: Deactivated successfully. Jun 25 18:39:06.266002 systemd-logind[1639]: Session 25 logged out. Waiting for processes to exit. Jun 25 18:39:06.266614 systemd-logind[1639]: Removed session 25. Jun 25 18:39:06.197000 audit[5786]: USER_ACCT pid=5786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.292475 kernel: audit: type=1101 audit(1719340746.197:459): pid=5786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.198000 audit[5786]: CRED_ACQ pid=5786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.410363 kernel: audit: type=1103 audit(1719340746.198:460): pid=5786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.490188 kernel: audit: type=1006 audit(1719340746.198:461): pid=5786 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jun 25 18:39:06.198000 audit[5786]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda68f2450 a2=3 a3=7f7b0c345480 items=0 ppid=1 pid=5786 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:39:06.561531 kernel: audit: type=1300 audit(1719340746.198:461): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda68f2450 a2=3 a3=7f7b0c345480 items=0 ppid=1 pid=5786 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jun 25 18:39:06.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jun 25 18:39:06.626471 kernel: audit: type=1327 audit(1719340746.198:461): proctitle=737368643A20636F7265205B707269765D Jun 25 18:39:06.205000 audit[5786]: USER_START pid=5786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.686881 kernel: audit: type=1105 audit(1719340746.205:462): pid=5786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.206000 audit[5788]: CRED_ACQ pid=5788 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.775271 kernel: audit: type=1103 audit(1719340746.206:463): pid=5788 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.262000 audit[5786]: USER_END pid=5786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.870280 kernel: audit: type=1106 audit(1719340746.262:464): pid=5786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.262000 audit[5786]: CRED_DISP pid=5786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.959612 kernel: audit: type=1104 audit(1719340746.262:465): pid=5786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jun 25 18:39:06.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-136.144.54.115:22-139.178.68.195:59460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jun 25 18:39:07.377832 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:39:07.377Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"} Jun 25 18:39:07.377832 etcd-wrapper[2662]: {"level":"warn","ts":"2024-06-25T18:39:07.377Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"a76424b6b153f753","rtt":"0s","error":"dial tcp 10.67.80.35:2380: connect: connection refused"}