Jul 2 07:09:23.680490 kernel: microcode: microcode updated early to revision 0xfa, date = 2023-02-27 Jul 2 07:09:23.680501 kernel: Linux version 6.1.96-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.2.1_p20230826 p7) 13.2.1 20230826, GNU ld (Gentoo 2.40 p5) 2.40.0) #1 SMP PREEMPT_DYNAMIC Mon Jul 1 23:29:55 -00 2024 Jul 2 07:09:23.680507 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=5c215d2523556d4992ba36684815e8e6fad1d468795f4ed0868a855d0b76a607 Jul 2 07:09:23.680512 kernel: BIOS-provided physical RAM map: Jul 2 07:09:23.680516 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Jul 2 07:09:23.680519 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Jul 2 07:09:23.680524 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Jul 2 07:09:23.680528 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Jul 2 07:09:23.680531 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Jul 2 07:09:23.680535 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b1afff] usable Jul 2 07:09:23.680539 kernel: BIOS-e820: [mem 0x0000000081b1b000-0x0000000081b1bfff] ACPI NVS Jul 2 07:09:23.680543 kernel: BIOS-e820: [mem 0x0000000081b1c000-0x0000000081b1cfff] reserved Jul 2 07:09:23.680547 kernel: BIOS-e820: [mem 0x0000000081b1d000-0x000000008afccfff] usable Jul 2 07:09:23.680550 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Jul 2 07:09:23.680555 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Jul 2 07:09:23.680559 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Jul 2 07:09:23.680564 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Jul 2 07:09:23.680568 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Jul 2 07:09:23.680572 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Jul 2 07:09:23.680576 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Jul 2 07:09:23.680580 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Jul 2 07:09:23.680584 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Jul 2 07:09:23.680588 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Jul 2 07:09:23.680592 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Jul 2 07:09:23.680596 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Jul 2 07:09:23.680600 kernel: NX (Execute Disable) protection: active Jul 2 07:09:23.680604 kernel: SMBIOS 3.2.1 present. Jul 2 07:09:23.680608 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Jul 2 07:09:23.680613 kernel: tsc: Detected 3400.000 MHz processor Jul 2 07:09:23.680617 kernel: tsc: Detected 3399.906 MHz TSC Jul 2 07:09:23.680621 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:09:23.680626 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:09:23.680630 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Jul 2 07:09:23.680634 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:09:23.680638 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Jul 2 07:09:23.680643 kernel: Using GB pages for direct mapping Jul 2 07:09:23.680647 kernel: ACPI: Early table checksum verification disabled Jul 2 07:09:23.680652 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Jul 2 07:09:23.680656 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Jul 2 07:09:23.680660 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Jul 2 07:09:23.680666 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Jul 2 07:09:23.680671 kernel: ACPI: FACS 0x000000008C66CF80 000040 Jul 2 07:09:23.680675 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Jul 2 07:09:23.680680 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Jul 2 07:09:23.680686 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Jul 2 07:09:23.680690 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Jul 2 07:09:23.680695 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Jul 2 07:09:23.680699 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Jul 2 07:09:23.680704 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Jul 2 07:09:23.680708 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Jul 2 07:09:23.680713 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 07:09:23.680718 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Jul 2 07:09:23.680723 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Jul 2 07:09:23.680728 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 07:09:23.680732 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 07:09:23.680737 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Jul 2 07:09:23.680741 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Jul 2 07:09:23.680746 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 07:09:23.680750 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Jul 2 07:09:23.680756 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Jul 2 07:09:23.680760 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Jul 2 07:09:23.680765 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Jul 2 07:09:23.680769 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Jul 2 07:09:23.680774 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Jul 2 07:09:23.680778 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Jul 2 07:09:23.680783 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Jul 2 07:09:23.680788 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Jul 2 07:09:23.680792 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Jul 2 07:09:23.680798 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Jul 2 07:09:23.680802 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Jul 2 07:09:23.680807 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Jul 2 07:09:23.680811 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Jul 2 07:09:23.680816 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Jul 2 07:09:23.680820 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Jul 2 07:09:23.680825 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Jul 2 07:09:23.680829 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Jul 2 07:09:23.680834 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Jul 2 07:09:23.680839 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Jul 2 07:09:23.680844 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Jul 2 07:09:23.680848 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Jul 2 07:09:23.680853 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Jul 2 07:09:23.680857 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Jul 2 07:09:23.680862 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Jul 2 07:09:23.680866 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Jul 2 07:09:23.680871 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Jul 2 07:09:23.680875 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Jul 2 07:09:23.680880 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Jul 2 07:09:23.680885 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Jul 2 07:09:23.680890 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Jul 2 07:09:23.680894 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Jul 2 07:09:23.680899 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Jul 2 07:09:23.680903 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Jul 2 07:09:23.680908 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Jul 2 07:09:23.680912 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Jul 2 07:09:23.680917 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Jul 2 07:09:23.680922 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Jul 2 07:09:23.680927 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Jul 2 07:09:23.680931 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Jul 2 07:09:23.680936 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Jul 2 07:09:23.680940 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Jul 2 07:09:23.680945 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Jul 2 07:09:23.680949 kernel: No NUMA configuration found Jul 2 07:09:23.680954 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Jul 2 07:09:23.680958 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Jul 2 07:09:23.680963 kernel: Zone ranges: Jul 2 07:09:23.680969 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:09:23.680973 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 07:09:23.680978 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Jul 2 07:09:23.680982 kernel: Movable zone start for each node Jul 2 07:09:23.680987 kernel: Early memory node ranges Jul 2 07:09:23.680991 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Jul 2 07:09:23.680996 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Jul 2 07:09:23.681000 kernel: node 0: [mem 0x0000000040400000-0x0000000081b1afff] Jul 2 07:09:23.681005 kernel: node 0: [mem 0x0000000081b1d000-0x000000008afccfff] Jul 2 07:09:23.681010 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Jul 2 07:09:23.681015 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Jul 2 07:09:23.681019 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Jul 2 07:09:23.681024 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Jul 2 07:09:23.681031 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:09:23.681037 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Jul 2 07:09:23.681042 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Jul 2 07:09:23.681047 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Jul 2 07:09:23.681053 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Jul 2 07:09:23.681057 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Jul 2 07:09:23.681062 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Jul 2 07:09:23.681067 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Jul 2 07:09:23.681072 kernel: ACPI: PM-Timer IO Port: 0x1808 Jul 2 07:09:23.681077 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Jul 2 07:09:23.681082 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Jul 2 07:09:23.681087 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Jul 2 07:09:23.681092 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Jul 2 07:09:23.681097 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Jul 2 07:09:23.681102 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Jul 2 07:09:23.681107 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Jul 2 07:09:23.681112 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Jul 2 07:09:23.681116 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Jul 2 07:09:23.681121 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Jul 2 07:09:23.681126 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Jul 2 07:09:23.681131 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Jul 2 07:09:23.681136 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Jul 2 07:09:23.681141 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Jul 2 07:09:23.681146 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Jul 2 07:09:23.681151 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Jul 2 07:09:23.681156 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Jul 2 07:09:23.681161 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 07:09:23.681165 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:09:23.681170 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:09:23.681175 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 2 07:09:23.681180 kernel: TSC deadline timer available Jul 2 07:09:23.681186 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Jul 2 07:09:23.681191 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Jul 2 07:09:23.681196 kernel: Booting paravirtualized kernel on bare hardware Jul 2 07:09:23.681201 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:09:23.681206 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1 Jul 2 07:09:23.681210 kernel: percpu: Embedded 57 pages/cpu s194792 r8192 d30488 u262144 Jul 2 07:09:23.681215 kernel: pcpu-alloc: s194792 r8192 d30488 u262144 alloc=1*2097152 Jul 2 07:09:23.681220 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Jul 2 07:09:23.681225 kernel: Fallback order for Node 0: 0 Jul 2 07:09:23.681230 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Jul 2 07:09:23.681235 kernel: Policy zone: Normal Jul 2 07:09:23.681241 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=5c215d2523556d4992ba36684815e8e6fad1d468795f4ed0868a855d0b76a607 Jul 2 07:09:23.681246 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:09:23.681250 kernel: random: crng init done Jul 2 07:09:23.681255 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Jul 2 07:09:23.681260 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Jul 2 07:09:23.681265 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:09:23.681271 kernel: software IO TLB: area num 16. Jul 2 07:09:23.681276 kernel: Memory: 32716400K/33452980K available (12293K kernel code, 2301K rwdata, 19992K rodata, 47156K init, 4308K bss, 736324K reserved, 0K cma-reserved) Jul 2 07:09:23.681281 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Jul 2 07:09:23.681286 kernel: ftrace: allocating 36081 entries in 141 pages Jul 2 07:09:23.681290 kernel: ftrace: allocated 141 pages with 4 groups Jul 2 07:09:23.681295 kernel: Dynamic Preempt: voluntary Jul 2 07:09:23.681300 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 07:09:23.681305 kernel: rcu: RCU event tracing is enabled. Jul 2 07:09:23.681310 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Jul 2 07:09:23.681316 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 07:09:23.681321 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:09:23.681328 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:09:23.681333 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:09:23.681338 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Jul 2 07:09:23.681343 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Jul 2 07:09:23.681373 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jul 2 07:09:23.681378 kernel: Console: colour dummy device 80x25 Jul 2 07:09:23.681382 kernel: printk: console [tty0] enabled Jul 2 07:09:23.681408 kernel: printk: console [ttyS1] enabled Jul 2 07:09:23.681413 kernel: ACPI: Core revision 20220331 Jul 2 07:09:23.681418 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Jul 2 07:09:23.681423 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:09:23.681428 kernel: DMAR: Host address width 39 Jul 2 07:09:23.681433 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Jul 2 07:09:23.681438 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Jul 2 07:09:23.681443 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Jul 2 07:09:23.681448 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Jul 2 07:09:23.681453 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Jul 2 07:09:23.681459 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Jul 2 07:09:23.681464 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Jul 2 07:09:23.681468 kernel: x2apic enabled Jul 2 07:09:23.681473 kernel: Switched APIC routing to cluster x2apic. Jul 2 07:09:23.681478 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Jul 2 07:09:23.681483 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Jul 2 07:09:23.681488 kernel: CPU0: Thermal monitoring enabled (TM1) Jul 2 07:09:23.681493 kernel: process: using mwait in idle threads Jul 2 07:09:23.681498 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 2 07:09:23.681503 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jul 2 07:09:23.681508 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:09:23.681513 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 2 07:09:23.681518 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 2 07:09:23.681522 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Jul 2 07:09:23.681527 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:09:23.681532 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Jul 2 07:09:23.681537 kernel: RETBleed: Mitigation: Enhanced IBRS Jul 2 07:09:23.681541 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 07:09:23.681546 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Jul 2 07:09:23.681551 kernel: TAA: Mitigation: TSX disabled Jul 2 07:09:23.681557 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Jul 2 07:09:23.681561 kernel: SRBDS: Mitigation: Microcode Jul 2 07:09:23.681566 kernel: GDS: Mitigation: Microcode Jul 2 07:09:23.681571 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:09:23.681576 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:09:23.681581 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:09:23.681585 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Jul 2 07:09:23.681590 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Jul 2 07:09:23.681595 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:09:23.681600 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Jul 2 07:09:23.681604 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Jul 2 07:09:23.681610 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Jul 2 07:09:23.681615 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:09:23.681620 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:09:23.681624 kernel: LSM: Security Framework initializing Jul 2 07:09:23.681629 kernel: SELinux: Initializing. Jul 2 07:09:23.681634 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:09:23.681639 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:09:23.681644 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Jul 2 07:09:23.681649 kernel: cblist_init_generic: Setting adjustable number of callback queues. Jul 2 07:09:23.681654 kernel: cblist_init_generic: Setting shift to 4 and lim to 1. Jul 2 07:09:23.681658 kernel: cblist_init_generic: Setting adjustable number of callback queues. Jul 2 07:09:23.681664 kernel: cblist_init_generic: Setting shift to 4 and lim to 1. Jul 2 07:09:23.681669 kernel: cblist_init_generic: Setting adjustable number of callback queues. Jul 2 07:09:23.681674 kernel: cblist_init_generic: Setting shift to 4 and lim to 1. Jul 2 07:09:23.681679 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Jul 2 07:09:23.681683 kernel: ... version: 4 Jul 2 07:09:23.681688 kernel: ... bit width: 48 Jul 2 07:09:23.681693 kernel: ... generic registers: 4 Jul 2 07:09:23.681698 kernel: ... value mask: 0000ffffffffffff Jul 2 07:09:23.681703 kernel: ... max period: 00007fffffffffff Jul 2 07:09:23.681708 kernel: ... fixed-purpose events: 3 Jul 2 07:09:23.681713 kernel: ... event mask: 000000070000000f Jul 2 07:09:23.681718 kernel: signal: max sigframe size: 2032 Jul 2 07:09:23.681723 kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Jul 2 07:09:23.681728 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:09:23.681733 kernel: rcu: Max phase no-delay instances is 400. Jul 2 07:09:23.681738 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Jul 2 07:09:23.681743 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:09:23.681747 kernel: x86: Booting SMP configuration: Jul 2 07:09:23.681752 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Jul 2 07:09:23.681758 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:09:23.681763 kernel: #9 #10 #11 #12 #13 #14 #15 Jul 2 07:09:23.681768 kernel: smp: Brought up 1 node, 16 CPUs Jul 2 07:09:23.681773 kernel: smpboot: Max logical packages: 1 Jul 2 07:09:23.681778 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Jul 2 07:09:23.681783 kernel: devtmpfs: initialized Jul 2 07:09:23.681787 kernel: x86/mm: Memory block size: 128MB Jul 2 07:09:23.681792 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b1b000-0x81b1bfff] (4096 bytes) Jul 2 07:09:23.681798 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Jul 2 07:09:23.681803 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:09:23.681808 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Jul 2 07:09:23.681813 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:09:23.681818 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:09:23.681823 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:09:23.681827 kernel: audit: type=2000 audit(1719904158.057:1): state=initialized audit_enabled=0 res=1 Jul 2 07:09:23.681832 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:09:23.681837 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:09:23.681843 kernel: cpuidle: using governor menu Jul 2 07:09:23.681848 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:09:23.681852 kernel: dca service started, version 1.12.1 Jul 2 07:09:23.681857 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Jul 2 07:09:23.681862 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Jul 2 07:09:23.681867 kernel: PCI: Using configuration type 1 for base access Jul 2 07:09:23.681872 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Jul 2 07:09:23.681877 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:09:23.681882 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:09:23.681887 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Jul 2 07:09:23.681892 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:09:23.681897 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Jul 2 07:09:23.681902 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:09:23.681907 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:09:23.681912 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:09:23.681917 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:09:23.681922 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Jul 2 07:09:23.681926 kernel: ACPI: Dynamic OEM Table Load: Jul 2 07:09:23.681932 kernel: ACPI: SSDT 0xFFFF8BB481F56200 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Jul 2 07:09:23.681937 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Jul 2 07:09:23.681942 kernel: ACPI: Dynamic OEM Table Load: Jul 2 07:09:23.681947 kernel: ACPI: SSDT 0xFFFF8BB481B47000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Jul 2 07:09:23.681952 kernel: ACPI: Dynamic OEM Table Load: Jul 2 07:09:23.681956 kernel: ACPI: SSDT 0xFFFF8BB481AF9000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Jul 2 07:09:23.681961 kernel: ACPI: Dynamic OEM Table Load: Jul 2 07:09:23.681966 kernel: ACPI: SSDT 0xFFFF8BB481F66800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Jul 2 07:09:23.681971 kernel: ACPI: Dynamic OEM Table Load: Jul 2 07:09:23.681975 kernel: ACPI: SSDT 0xFFFF8BB48015E000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Jul 2 07:09:23.681981 kernel: ACPI: Dynamic OEM Table Load: Jul 2 07:09:23.681986 kernel: ACPI: SSDT 0xFFFF8BB481B46400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Jul 2 07:09:23.681991 kernel: ACPI: Interpreter enabled Jul 2 07:09:23.681996 kernel: ACPI: PM: (supports S0 S5) Jul 2 07:09:23.682001 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:09:23.682005 kernel: HEST: Enabling Firmware First mode for corrected errors. Jul 2 07:09:23.682010 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Jul 2 07:09:23.682015 kernel: HEST: Table parsing has been initialized. Jul 2 07:09:23.682020 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Jul 2 07:09:23.682026 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:09:23.682031 kernel: PCI: Using E820 reservations for host bridge windows Jul 2 07:09:23.682036 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Jul 2 07:09:23.682040 kernel: ACPI: PM: Power Resource [USBC] Jul 2 07:09:23.682045 kernel: ACPI: PM: Power Resource [V0PR] Jul 2 07:09:23.682050 kernel: ACPI: PM: Power Resource [V1PR] Jul 2 07:09:23.682055 kernel: ACPI: PM: Power Resource [V2PR] Jul 2 07:09:23.682060 kernel: ACPI: PM: Power Resource [WRST] Jul 2 07:09:23.682064 kernel: ACPI: PM: Power Resource [FN00] Jul 2 07:09:23.682070 kernel: ACPI: PM: Power Resource [FN01] Jul 2 07:09:23.682075 kernel: ACPI: PM: Power Resource [FN02] Jul 2 07:09:23.682080 kernel: ACPI: PM: Power Resource [FN03] Jul 2 07:09:23.682084 kernel: ACPI: PM: Power Resource [FN04] Jul 2 07:09:23.682089 kernel: ACPI: PM: Power Resource [PIN] Jul 2 07:09:23.682094 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Jul 2 07:09:23.682169 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:09:23.682264 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Jul 2 07:09:23.682310 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Jul 2 07:09:23.682318 kernel: PCI host bridge to bus 0000:00 Jul 2 07:09:23.682404 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:09:23.682444 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:09:23.682481 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:09:23.682517 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Jul 2 07:09:23.682555 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Jul 2 07:09:23.682593 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Jul 2 07:09:23.682647 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Jul 2 07:09:23.682698 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Jul 2 07:09:23.682743 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Jul 2 07:09:23.682790 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Jul 2 07:09:23.682833 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Jul 2 07:09:23.682881 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Jul 2 07:09:23.682924 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Jul 2 07:09:23.682971 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Jul 2 07:09:23.683013 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Jul 2 07:09:23.683057 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Jul 2 07:09:23.683104 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Jul 2 07:09:23.683147 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Jul 2 07:09:23.683189 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Jul 2 07:09:23.683236 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Jul 2 07:09:23.683278 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jul 2 07:09:23.683329 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Jul 2 07:09:23.683409 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jul 2 07:09:23.683457 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Jul 2 07:09:23.683506 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Jul 2 07:09:23.683551 kernel: pci 0000:00:16.0: PME# supported from D3hot Jul 2 07:09:23.683596 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Jul 2 07:09:23.683640 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Jul 2 07:09:23.683681 kernel: pci 0000:00:16.1: PME# supported from D3hot Jul 2 07:09:23.683727 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Jul 2 07:09:23.683771 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Jul 2 07:09:23.683813 kernel: pci 0000:00:16.4: PME# supported from D3hot Jul 2 07:09:23.683858 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Jul 2 07:09:23.683900 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Jul 2 07:09:23.683942 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Jul 2 07:09:23.683983 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Jul 2 07:09:23.684025 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Jul 2 07:09:23.684068 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Jul 2 07:09:23.684113 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Jul 2 07:09:23.684155 kernel: pci 0000:00:17.0: PME# supported from D3hot Jul 2 07:09:23.684203 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Jul 2 07:09:23.684248 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Jul 2 07:09:23.684295 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Jul 2 07:09:23.684361 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Jul 2 07:09:23.684434 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Jul 2 07:09:23.684478 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Jul 2 07:09:23.684524 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Jul 2 07:09:23.684569 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Jul 2 07:09:23.684615 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Jul 2 07:09:23.684658 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Jul 2 07:09:23.684706 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Jul 2 07:09:23.684748 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jul 2 07:09:23.684794 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Jul 2 07:09:23.684843 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Jul 2 07:09:23.684887 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Jul 2 07:09:23.684929 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Jul 2 07:09:23.684978 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Jul 2 07:09:23.685021 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Jul 2 07:09:23.685069 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Jul 2 07:09:23.685116 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Jul 2 07:09:23.685160 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Jul 2 07:09:23.685204 kernel: pci 0000:01:00.0: PME# supported from D3cold Jul 2 07:09:23.685248 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jul 2 07:09:23.685293 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jul 2 07:09:23.685366 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Jul 2 07:09:23.685434 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Jul 2 07:09:23.685480 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Jul 2 07:09:23.685524 kernel: pci 0000:01:00.1: PME# supported from D3cold Jul 2 07:09:23.685567 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jul 2 07:09:23.685611 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jul 2 07:09:23.685654 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 2 07:09:23.685697 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Jul 2 07:09:23.685739 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jul 2 07:09:23.685782 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Jul 2 07:09:23.685832 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Jul 2 07:09:23.685876 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Jul 2 07:09:23.685920 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Jul 2 07:09:23.685963 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Jul 2 07:09:23.686007 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Jul 2 07:09:23.686051 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Jul 2 07:09:23.686095 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Jul 2 07:09:23.686140 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jul 2 07:09:23.686182 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Jul 2 07:09:23.686232 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Jul 2 07:09:23.686276 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Jul 2 07:09:23.686320 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Jul 2 07:09:23.686407 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Jul 2 07:09:23.686452 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Jul 2 07:09:23.686495 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Jul 2 07:09:23.686541 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Jul 2 07:09:23.686583 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jul 2 07:09:23.686626 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Jul 2 07:09:23.686668 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Jul 2 07:09:23.686715 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Jul 2 07:09:23.686761 kernel: pci 0000:06:00.0: enabling Extended Tags Jul 2 07:09:23.686804 kernel: pci 0000:06:00.0: supports D1 D2 Jul 2 07:09:23.686850 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 07:09:23.686892 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Jul 2 07:09:23.686936 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Jul 2 07:09:23.686978 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Jul 2 07:09:23.687028 kernel: pci_bus 0000:07: extended config space not accessible Jul 2 07:09:23.687078 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Jul 2 07:09:23.687126 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Jul 2 07:09:23.687174 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Jul 2 07:09:23.687220 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Jul 2 07:09:23.687266 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 07:09:23.687312 kernel: pci 0000:07:00.0: supports D1 D2 Jul 2 07:09:23.687386 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 07:09:23.687452 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Jul 2 07:09:23.687497 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Jul 2 07:09:23.687542 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Jul 2 07:09:23.687550 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Jul 2 07:09:23.687556 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Jul 2 07:09:23.687561 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Jul 2 07:09:23.687566 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Jul 2 07:09:23.687571 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Jul 2 07:09:23.687576 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Jul 2 07:09:23.687582 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Jul 2 07:09:23.687587 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Jul 2 07:09:23.687593 kernel: iommu: Default domain type: Translated Jul 2 07:09:23.687598 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:09:23.687603 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:09:23.687609 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:09:23.687614 kernel: PTP clock support registered Jul 2 07:09:23.687619 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:09:23.687625 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:09:23.687630 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Jul 2 07:09:23.687635 kernel: e820: reserve RAM buffer [mem 0x81b1b000-0x83ffffff] Jul 2 07:09:23.687641 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Jul 2 07:09:23.687646 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Jul 2 07:09:23.687651 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Jul 2 07:09:23.687656 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Jul 2 07:09:23.687701 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Jul 2 07:09:23.687748 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Jul 2 07:09:23.687794 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 07:09:23.687801 kernel: vgaarb: loaded Jul 2 07:09:23.687806 kernel: clocksource: Switched to clocksource tsc-early Jul 2 07:09:23.687813 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:09:23.687818 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:09:23.687824 kernel: pnp: PnP ACPI init Jul 2 07:09:23.687868 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Jul 2 07:09:23.687911 kernel: pnp 00:02: [dma 0 disabled] Jul 2 07:09:23.687952 kernel: pnp 00:03: [dma 0 disabled] Jul 2 07:09:23.687997 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Jul 2 07:09:23.688037 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Jul 2 07:09:23.688078 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Jul 2 07:09:23.688121 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Jul 2 07:09:23.688159 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Jul 2 07:09:23.688196 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Jul 2 07:09:23.688234 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Jul 2 07:09:23.688274 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Jul 2 07:09:23.688311 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Jul 2 07:09:23.688379 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Jul 2 07:09:23.688436 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Jul 2 07:09:23.688478 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Jul 2 07:09:23.688515 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Jul 2 07:09:23.688552 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Jul 2 07:09:23.688592 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Jul 2 07:09:23.688629 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Jul 2 07:09:23.688668 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Jul 2 07:09:23.688705 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Jul 2 07:09:23.688746 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Jul 2 07:09:23.688754 kernel: pnp: PnP ACPI: found 10 devices Jul 2 07:09:23.688759 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:09:23.688765 kernel: NET: Registered PF_INET protocol family Jul 2 07:09:23.688771 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 07:09:23.688776 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 07:09:23.688782 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:09:23.688787 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 07:09:23.688792 kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Jul 2 07:09:23.688798 kernel: TCP: Hash tables configured (established 262144 bind 65536) Jul 2 07:09:23.688803 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Jul 2 07:09:23.688808 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Jul 2 07:09:23.688814 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:09:23.688819 kernel: NET: Registered PF_XDP protocol family Jul 2 07:09:23.688862 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Jul 2 07:09:23.688907 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Jul 2 07:09:23.688949 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Jul 2 07:09:23.688994 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Jul 2 07:09:23.689039 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jul 2 07:09:23.689082 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Jul 2 07:09:23.689129 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jul 2 07:09:23.689173 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 2 07:09:23.689216 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Jul 2 07:09:23.689259 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jul 2 07:09:23.689301 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Jul 2 07:09:23.689377 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Jul 2 07:09:23.689436 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jul 2 07:09:23.689480 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Jul 2 07:09:23.689522 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Jul 2 07:09:23.689565 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jul 2 07:09:23.689606 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Jul 2 07:09:23.689649 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Jul 2 07:09:23.689693 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Jul 2 07:09:23.689737 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Jul 2 07:09:23.689782 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Jul 2 07:09:23.689824 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Jul 2 07:09:23.689867 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Jul 2 07:09:23.689909 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Jul 2 07:09:23.689949 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Jul 2 07:09:23.689986 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:09:23.690024 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:09:23.690061 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:09:23.690099 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Jul 2 07:09:23.690138 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Jul 2 07:09:23.690181 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Jul 2 07:09:23.690222 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Jul 2 07:09:23.690268 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Jul 2 07:09:23.690308 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Jul 2 07:09:23.690378 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Jul 2 07:09:23.690437 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Jul 2 07:09:23.690480 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Jul 2 07:09:23.690520 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Jul 2 07:09:23.690562 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Jul 2 07:09:23.690604 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Jul 2 07:09:23.690611 kernel: PCI: CLS 64 bytes, default 64 Jul 2 07:09:23.690618 kernel: DMAR: No ATSR found Jul 2 07:09:23.690623 kernel: DMAR: No SATC found Jul 2 07:09:23.690628 kernel: DMAR: dmar0: Using Queued invalidation Jul 2 07:09:23.690672 kernel: pci 0000:00:00.0: Adding to iommu group 0 Jul 2 07:09:23.690715 kernel: pci 0000:00:01.0: Adding to iommu group 1 Jul 2 07:09:23.690759 kernel: pci 0000:00:08.0: Adding to iommu group 2 Jul 2 07:09:23.690801 kernel: pci 0000:00:12.0: Adding to iommu group 3 Jul 2 07:09:23.690843 kernel: pci 0000:00:14.0: Adding to iommu group 4 Jul 2 07:09:23.690886 kernel: pci 0000:00:14.2: Adding to iommu group 4 Jul 2 07:09:23.690929 kernel: pci 0000:00:15.0: Adding to iommu group 5 Jul 2 07:09:23.690972 kernel: pci 0000:00:15.1: Adding to iommu group 5 Jul 2 07:09:23.691014 kernel: pci 0000:00:16.0: Adding to iommu group 6 Jul 2 07:09:23.691056 kernel: pci 0000:00:16.1: Adding to iommu group 6 Jul 2 07:09:23.691098 kernel: pci 0000:00:16.4: Adding to iommu group 6 Jul 2 07:09:23.691139 kernel: pci 0000:00:17.0: Adding to iommu group 7 Jul 2 07:09:23.691181 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Jul 2 07:09:23.691223 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Jul 2 07:09:23.691268 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Jul 2 07:09:23.691311 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Jul 2 07:09:23.691383 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Jul 2 07:09:23.691441 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Jul 2 07:09:23.691485 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Jul 2 07:09:23.691526 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Jul 2 07:09:23.691568 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Jul 2 07:09:23.691613 kernel: pci 0000:01:00.0: Adding to iommu group 1 Jul 2 07:09:23.691659 kernel: pci 0000:01:00.1: Adding to iommu group 1 Jul 2 07:09:23.691704 kernel: pci 0000:03:00.0: Adding to iommu group 15 Jul 2 07:09:23.691747 kernel: pci 0000:04:00.0: Adding to iommu group 16 Jul 2 07:09:23.691792 kernel: pci 0000:06:00.0: Adding to iommu group 17 Jul 2 07:09:23.691838 kernel: pci 0000:07:00.0: Adding to iommu group 17 Jul 2 07:09:23.691845 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Jul 2 07:09:23.691851 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 07:09:23.691856 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Jul 2 07:09:23.691861 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Jul 2 07:09:23.691868 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Jul 2 07:09:23.691873 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Jul 2 07:09:23.691878 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Jul 2 07:09:23.691927 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Jul 2 07:09:23.691935 kernel: Initialise system trusted keyrings Jul 2 07:09:23.691940 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Jul 2 07:09:23.691945 kernel: Key type asymmetric registered Jul 2 07:09:23.691950 kernel: Asymmetric key parser 'x509' registered Jul 2 07:09:23.691957 kernel: alg: self-tests for CTR-KDF (hmac(sha256)) passed Jul 2 07:09:23.691962 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:09:23.691968 kernel: io scheduler mq-deadline registered Jul 2 07:09:23.691973 kernel: io scheduler kyber registered Jul 2 07:09:23.691978 kernel: io scheduler bfq registered Jul 2 07:09:23.692020 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Jul 2 07:09:23.692064 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Jul 2 07:09:23.692107 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Jul 2 07:09:23.692151 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Jul 2 07:09:23.692196 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Jul 2 07:09:23.692239 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Jul 2 07:09:23.692289 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Jul 2 07:09:23.692296 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Jul 2 07:09:23.692302 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Jul 2 07:09:23.692307 kernel: pstore: Registered erst as persistent store backend Jul 2 07:09:23.692312 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:09:23.692319 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:09:23.692327 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:09:23.692332 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 07:09:23.692337 kernel: hpet_acpi_add: no address or irqs in _CRS Jul 2 07:09:23.692422 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Jul 2 07:09:23.692430 kernel: i8042: PNP: No PS/2 controller found. Jul 2 07:09:23.692469 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Jul 2 07:09:23.692509 kernel: rtc_cmos rtc_cmos: registered as rtc0 Jul 2 07:09:23.692550 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-07-02T07:09:22 UTC (1719904162) Jul 2 07:09:23.692588 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Jul 2 07:09:23.692595 kernel: fail to initialize ptp_kvm Jul 2 07:09:23.692601 kernel: intel_pstate: Intel P-state driver initializing Jul 2 07:09:23.692606 kernel: intel_pstate: Disabling energy efficiency optimization Jul 2 07:09:23.692611 kernel: intel_pstate: HWP enabled Jul 2 07:09:23.692616 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Jul 2 07:09:23.692621 kernel: vesafb: scrolling: redraw Jul 2 07:09:23.692628 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Jul 2 07:09:23.692633 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000756b6ab2, using 768k, total 768k Jul 2 07:09:23.692638 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 07:09:23.692644 kernel: fb0: VESA VGA frame buffer device Jul 2 07:09:23.692649 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:09:23.692654 kernel: Segment Routing with IPv6 Jul 2 07:09:23.692659 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:09:23.692664 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:09:23.692670 kernel: Key type dns_resolver registered Jul 2 07:09:23.692675 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xfa Jul 2 07:09:23.692681 kernel: microcode: Microcode Update Driver: v2.2. Jul 2 07:09:23.692686 kernel: IPI shorthand broadcast: enabled Jul 2 07:09:23.692691 kernel: sched_clock: Marking stable (1599095303, 1373428749)->(4441814057, -1469290005) Jul 2 07:09:23.692696 kernel: registered taskstats version 1 Jul 2 07:09:23.692702 kernel: Loading compiled-in X.509 certificates Jul 2 07:09:23.692707 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.1.96-flatcar: ad4c54fcfdf0a10b17828c4377e868762dc43797' Jul 2 07:09:23.692712 kernel: Key type .fscrypt registered Jul 2 07:09:23.692717 kernel: Key type fscrypt-provisioning registered Jul 2 07:09:23.692722 kernel: pstore: Using crash dump compression: deflate Jul 2 07:09:23.692728 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:09:23.692734 kernel: ima: No architecture policies found Jul 2 07:09:23.692739 kernel: clk: Disabling unused clocks Jul 2 07:09:23.692744 kernel: Freeing unused kernel image (initmem) memory: 47156K Jul 2 07:09:23.692749 kernel: Write protecting the kernel read-only data: 34816k Jul 2 07:09:23.692755 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:09:23.692760 kernel: Freeing unused kernel image (rodata/data gap) memory: 488K Jul 2 07:09:23.692765 kernel: Run /init as init process Jul 2 07:09:23.692771 kernel: with arguments: Jul 2 07:09:23.692776 kernel: /init Jul 2 07:09:23.692781 kernel: with environment: Jul 2 07:09:23.692786 kernel: HOME=/ Jul 2 07:09:23.692791 kernel: TERM=linux Jul 2 07:09:23.692796 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:09:23.692803 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:09:23.692809 systemd[1]: Detected architecture x86-64. Jul 2 07:09:23.692816 systemd[1]: Running in initrd. Jul 2 07:09:23.692821 systemd[1]: No hostname configured, using default hostname. Jul 2 07:09:23.692826 systemd[1]: Hostname set to . Jul 2 07:09:23.692832 systemd[1]: Initializing machine ID from random generator. Jul 2 07:09:23.692837 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:09:23.692843 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jul 2 07:09:23.692848 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jul 2 07:09:23.692853 systemd[1]: Reached target paths.target - Path Units. Jul 2 07:09:23.692860 systemd[1]: Reached target slices.target - Slice Units. Jul 2 07:09:23.692865 systemd[1]: Reached target swap.target - Swaps. Jul 2 07:09:23.692870 systemd[1]: Reached target timers.target - Timer Units. Jul 2 07:09:23.692875 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket. Jul 2 07:09:23.692881 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jul 2 07:09:23.692886 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Jul 2 07:09:23.692892 systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Jul 2 07:09:23.692898 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Jul 2 07:09:23.692903 kernel: clocksource: Switched to clocksource tsc Jul 2 07:09:23.692909 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Jul 2 07:09:23.692914 systemd[1]: Listening on systemd-journald.socket - Journal Socket. Jul 2 07:09:23.692920 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Jul 2 07:09:23.692925 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jul 2 07:09:23.692930 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jul 2 07:09:23.692936 systemd[1]: Reached target sockets.target - Socket Units. Jul 2 07:09:23.692941 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jul 2 07:09:23.692948 systemd[1]: Finished network-cleanup.service - Network Cleanup. Jul 2 07:09:23.692953 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:09:23.692959 systemd[1]: Starting systemd-journald.service - Journal Service... Jul 2 07:09:23.692966 systemd-journald[268]: Journal started Jul 2 07:09:23.692991 systemd-journald[268]: Runtime Journal (/run/log/journal/3eb4b343a3614548bd4aed6a2c4db6ae) is 8.0M, max 639.9M, 631.9M free. Jul 2 07:09:23.721364 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jul 2 07:09:23.722484 systemd-modules-load[271]: Inserted module 'overlay' Jul 2 07:09:23.771434 systemd[1]: Starting systemd-vconsole-setup.service - Setup Virtual Console... Jul 2 07:09:23.771445 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:09:23.810330 kernel: Bridge firewalling registered Jul 2 07:09:23.810347 systemd[1]: Started systemd-journald.service - Journal Service. Jul 2 07:09:23.828321 systemd-modules-load[271]: Inserted module 'br_netfilter' Jul 2 07:09:23.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:23.837557 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jul 2 07:09:23.952416 kernel: audit: type=1130 audit(1719904163.836:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:23.952478 kernel: SCSI subsystem initialized Jul 2 07:09:23.952485 kernel: audit: type=1130 audit(1719904163.906:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:23.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:23.907443 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:09:24.084306 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:09:24.084317 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:09:24.084324 kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Jul 2 07:09:24.084333 kernel: audit: type=1130 audit(1719904164.036:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.037275 systemd-modules-load[271]: Inserted module 'dm_multipath' Jul 2 07:09:24.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.037436 systemd[1]: Finished systemd-vconsole-setup.service - Setup Virtual Console. Jul 2 07:09:24.182424 kernel: audit: type=1130 audit(1719904164.093:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.182435 kernel: audit: type=1130 audit(1719904164.151:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.094640 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jul 2 07:09:24.205655 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Jul 2 07:09:24.242626 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jul 2 07:09:24.254024 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jul 2 07:09:24.283609 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Jul 2 07:09:24.295376 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jul 2 07:09:24.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.305775 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jul 2 07:09:24.415352 kernel: audit: type=1130 audit(1719904164.304:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.415379 kernel: audit: type=1130 audit(1719904164.364:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.365642 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jul 2 07:09:24.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.415533 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jul 2 07:09:24.510441 kernel: audit: type=1130 audit(1719904164.414:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.510454 kernel: audit: type=1130 audit(1719904164.477:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.537713 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Jul 2 07:09:24.545000 audit: BPF prog-id=6 op=LOAD Jul 2 07:09:24.547075 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Jul 2 07:09:24.567609 dracut-cmdline[300]: dracut-dracut-053 Jul 2 07:09:24.567609 dracut-cmdline[300]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jul 2 07:09:24.567609 dracut-cmdline[300]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=5c215d2523556d4992ba36684815e8e6fad1d468795f4ed0868a855d0b76a607 Jul 2 07:09:24.713589 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:09:24.713603 kernel: iscsi: registered transport (tcp) Jul 2 07:09:24.713614 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:09:24.713621 kernel: QLogic iSCSI HBA Driver Jul 2 07:09:24.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.564883 systemd-resolved[318]: Positive Trust Anchors: Jul 2 07:09:24.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:24.564889 systemd-resolved[318]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:09:24.564909 systemd-resolved[318]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:09:24.566642 systemd-resolved[318]: Defaulting to hostname 'linux'. Jul 2 07:09:24.822403 kernel: raid6: avx2x4 gen() 48446 MB/s Jul 2 07:09:24.567538 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Jul 2 07:09:24.588592 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Jul 2 07:09:24.859402 kernel: raid6: avx2x2 gen() 54443 MB/s Jul 2 07:09:24.701003 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Jul 2 07:09:24.733661 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Jul 2 07:09:24.921396 kernel: raid6: avx2x1 gen() 46092 MB/s Jul 2 07:09:24.921406 kernel: raid6: using algorithm avx2x2 gen() 54443 MB/s Jul 2 07:09:24.921413 kernel: raid6: .... xor() 32066 MB/s, rmw enabled Jul 2 07:09:24.931558 kernel: raid6: using avx2x2 recovery algorithm Jul 2 07:09:24.971345 kernel: xor: automatically using best checksumming function avx Jul 2 07:09:25.081360 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:09:25.087515 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Jul 2 07:09:25.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:25.096000 audit: BPF prog-id=7 op=LOAD Jul 2 07:09:25.096000 audit: BPF prog-id=8 op=LOAD Jul 2 07:09:25.113671 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jul 2 07:09:25.120476 systemd-udevd[482]: Using default interface naming scheme 'v252'. Jul 2 07:09:25.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:25.124480 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jul 2 07:09:25.177518 dracut-pre-trigger[494]: rd.md=0: removing MD RAID activation Jul 2 07:09:25.152488 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Jul 2 07:09:25.206761 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Jul 2 07:09:25.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:25.233763 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jul 2 07:09:25.325411 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jul 2 07:09:25.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:25.358336 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:09:25.382376 kernel: ACPI: bus type USB registered Jul 2 07:09:25.382414 kernel: usbcore: registered new interface driver usbfs Jul 2 07:09:25.408247 kernel: usbcore: registered new interface driver hub Jul 2 07:09:25.428137 kernel: usbcore: registered new device driver usb Jul 2 07:09:25.445331 kernel: libata version 3.00 loaded. Jul 2 07:09:25.501779 kernel: ahci 0000:00:17.0: version 3.0 Jul 2 07:09:26.048800 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:09:26.048817 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014 Jul 2 07:09:26.176520 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Jul 2 07:09:26.176581 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jul 2 07:09:26.176636 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Jul 2 07:09:26.176686 kernel: AES CTR mode by8 optimization enabled Jul 2 07:09:26.176694 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Jul 2 07:09:26.176700 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Jul 2 07:09:26.176710 kernel: scsi host0: ahci Jul 2 07:09:26.176768 kernel: scsi host1: ahci Jul 2 07:09:26.176821 kernel: pps pps0: new PPS source ptp0 Jul 2 07:09:26.176879 kernel: scsi host2: ahci Jul 2 07:09:26.176931 kernel: igb 0000:03:00.0: added PHC on eth0 Jul 2 07:09:26.176985 kernel: scsi host3: ahci Jul 2 07:09:26.177042 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Jul 2 07:09:26.177094 kernel: scsi host4: ahci Jul 2 07:09:26.177145 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d3:7e Jul 2 07:09:26.177195 kernel: scsi host5: ahci Jul 2 07:09:26.177248 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Jul 2 07:09:26.177297 kernel: scsi host6: ahci Jul 2 07:09:26.177356 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jul 2 07:09:26.177410 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Jul 2 07:09:26.177418 kernel: pps pps1: new PPS source ptp1 Jul 2 07:09:26.177469 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Jul 2 07:09:26.177477 kernel: igb 0000:04:00.0: added PHC on eth1 Jul 2 07:09:26.177529 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Jul 2 07:09:26.177579 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Jul 2 07:09:26.177587 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Jul 2 07:09:26.177638 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jul 2 07:09:26.177688 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Jul 2 07:09:26.177696 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d3:7f Jul 2 07:09:26.177745 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Jul 2 07:09:26.177752 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Jul 2 07:09:26.177800 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Jul 2 07:09:26.177807 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jul 2 07:09:26.177858 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Jul 2 07:09:26.177865 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jul 2 07:09:26.177915 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014 Jul 2 07:09:27.132100 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jul 2 07:09:27.132166 kernel: ata3: SATA link down (SStatus 0 SControl 300) Jul 2 07:09:27.132174 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 2 07:09:27.132181 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 2 07:09:27.132187 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jul 2 07:09:27.132211 kernel: ata7: SATA link down (SStatus 0 SControl 300) Jul 2 07:09:27.132221 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 2 07:09:27.132227 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jul 2 07:09:27.132234 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Jul 2 07:09:27.132241 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Jul 2 07:09:27.132247 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jul 2 07:09:27.132253 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Jul 2 07:09:27.132307 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jul 2 07:09:27.132314 kernel: port_module: 10 callbacks suppressed Jul 2 07:09:27.132321 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Jul 2 07:09:27.132393 kernel: ata2.00: Features: NCQ-prio Jul 2 07:09:27.132401 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jul 2 07:09:27.132450 kernel: ata1.00: Features: NCQ-prio Jul 2 07:09:27.132457 kernel: ata2.00: configured for UDMA/133 Jul 2 07:09:27.132464 kernel: ata1.00: configured for UDMA/133 Jul 2 07:09:27.132470 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Jul 2 07:09:27.151954 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Jul 2 07:09:27.276253 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jul 2 07:09:27.276315 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Jul 2 07:09:27.276375 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Jul 2 07:09:27.276426 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jul 2 07:09:27.276476 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Jul 2 07:09:27.276529 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jul 2 07:09:27.276586 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Jul 2 07:09:27.276635 kernel: hub 1-0:1.0: USB hub found Jul 2 07:09:27.276697 kernel: hub 1-0:1.0: 16 ports detected Jul 2 07:09:27.276752 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Jul 2 07:09:27.276804 kernel: hub 2-0:1.0: USB hub found Jul 2 07:09:27.276862 kernel: hub 2-0:1.0: 10 ports detected Jul 2 07:09:27.276914 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 07:09:27.276922 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 07:09:27.276928 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jul 2 07:09:27.276985 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jul 2 07:09:27.277041 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Jul 2 07:09:27.277095 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Jul 2 07:09:27.277149 kernel: sd 1:0:0:0: [sdb] Write Protect is off Jul 2 07:09:27.277203 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 2 07:09:27.277257 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Jul 2 07:09:27.277310 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 07:09:27.277371 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Jul 2 07:09:27.277424 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Jul 2 07:09:27.277479 kernel: sd 1:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Jul 2 07:09:27.277532 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 07:09:27.277585 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 07:09:27.277593 kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes Jul 2 07:09:27.277645 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 07:09:27.277653 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Jul 2 07:09:27.307782 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 07:09:27.307791 kernel: GPT:9289727 != 937703087 Jul 2 07:09:27.307798 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 2 07:09:27.307869 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 07:09:27.307877 kernel: GPT:9289727 != 937703087 Jul 2 07:09:27.307883 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 07:09:27.307889 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Jul 2 07:09:27.307908 kernel: hub 1-14:1.0: USB hub found Jul 2 07:09:27.307995 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Jul 2 07:09:27.308060 kernel: hub 1-14:1.0: 4 ports detected Jul 2 07:09:27.312066 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device - Micron_5300_MTFDDAK480TDT EFI-SYSTEM. Jul 2 07:09:27.378578 kernel: BTRFS: device fsid 1fca1e64-eeea-4360-9664-a9b6b3a60b6f devid 1 transid 35 /dev/sdb3 scanned by (udev-worker) (530) Jul 2 07:09:27.378590 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (529) Jul 2 07:09:27.378597 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Jul 2 07:09:27.361823 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Micron_5300_MTFDDAK480TDT ROOT. Jul 2 07:09:27.390907 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Micron_5300_MTFDDAK480TDT USR-A. Jul 2 07:09:27.419476 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Jul 2 07:09:27.430408 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Micron_5300_MTFDDAK480TDT USR-A. Jul 2 07:09:27.444855 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5300_MTFDDAK480TDT OEM. Jul 2 07:09:27.492859 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary... Jul 2 07:09:27.540511 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 07:09:27.540551 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Jul 2 07:09:27.540574 disk-uuid[704]: Primary Header is updated. Jul 2 07:09:27.540574 disk-uuid[704]: Secondary Entries is updated. Jul 2 07:09:27.540574 disk-uuid[704]: Secondary Header is updated. Jul 2 07:09:27.588359 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 07:09:27.588371 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Jul 2 07:09:27.642358 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Jul 2 07:09:27.758336 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 07:09:27.780246 kernel: usbcore: registered new interface driver usbhid Jul 2 07:09:27.780261 kernel: usbhid: USB HID core driver Jul 2 07:09:27.822502 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Jul 2 07:09:27.916793 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Jul 2 07:09:27.917215 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Jul 2 07:09:27.949411 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Jul 2 07:09:28.566277 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 07:09:28.585369 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Jul 2 07:09:28.585887 disk-uuid[705]: The operation has completed successfully. Jul 2 07:09:28.618877 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:09:28.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:28.618922 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary. Jul 2 07:09:28.735371 kernel: audit: type=1130 audit(1719904168.628:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:28.735391 kernel: audit: type=1131 audit(1719904168.628:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:28.735404 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:09:28.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:28.719677 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr... Jul 2 07:09:28.766413 sh[718]: Success Jul 2 07:09:28.794563 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr. Jul 2 07:09:28.811587 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr... Jul 2 07:09:28.823946 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr. Jul 2 07:09:29.030552 kernel: BTRFS info (device dm-0): first mount of filesystem 1fca1e64-eeea-4360-9664-a9b6b3a60b6f Jul 2 07:09:29.030565 kernel: audit: type=1130 audit(1719904168.852:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.030574 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:09:29.030580 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead Jul 2 07:09:29.030587 kernel: BTRFS info (device dm-0): disabling log replay at mount time Jul 2 07:09:29.030594 kernel: BTRFS info (device dm-0): using free space tree Jul 2 07:09:29.030600 kernel: BTRFS info (device dm-0): enabling ssd optimizations Jul 2 07:09:28.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.027588 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr. Jul 2 07:09:29.039632 systemd[1]: afterburn-network-kargs.service - Afterburn Initrd Setup Network Kernel Arguments was skipped because no trigger condition checks were met. Jul 2 07:09:29.165476 kernel: BTRFS info (device sdb6): first mount of filesystem f7c77bfb-d479-47f3-a34e-515c95184b74 Jul 2 07:09:29.165494 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:09:29.165501 kernel: BTRFS info (device sdb6): using free space tree Jul 2 07:09:29.165511 kernel: BTRFS info (device sdb6): enabling ssd optimizations Jul 2 07:09:29.165518 kernel: BTRFS info (device sdb6): last unmount of filesystem f7c77bfb-d479-47f3-a34e-515c95184b74 Jul 2 07:09:29.045474 systemd[1]: Starting ignition-setup.service - Ignition (setup)... Jul 2 07:09:29.065774 systemd[1]: Starting parse-ip-for-networkd.service - Write systemd-networkd units from cmdline... Jul 2 07:09:29.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.179967 systemd[1]: Finished ignition-setup.service - Ignition (setup). Jul 2 07:09:29.279416 kernel: audit: type=1130 audit(1719904169.188:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.279431 kernel: audit: type=1130 audit(1719904169.248:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.189741 systemd[1]: Finished parse-ip-for-networkd.service - Write systemd-networkd units from cmdline. Jul 2 07:09:29.305677 systemd[1]: Starting ignition-fetch-offline.service - Ignition (fetch-offline)... Jul 2 07:09:29.330000 audit: BPF prog-id=9 op=LOAD Jul 2 07:09:29.355336 kernel: audit: type=1334 audit(1719904169.330:25): prog-id=9 op=LOAD Jul 2 07:09:29.362058 ignition[899]: Ignition 2.15.0 Jul 2 07:09:29.362062 ignition[899]: Stage: fetch-offline Jul 2 07:09:29.365744 unknown[899]: fetched base config from "system" Jul 2 07:09:29.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.362088 ignition[899]: no configs at "/usr/lib/ignition/base.d" Jul 2 07:09:29.514467 kernel: audit: type=1130 audit(1719904169.397:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.514499 kernel: audit: type=1130 audit(1719904169.459:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.365748 unknown[899]: fetched user config from "system" Jul 2 07:09:29.362093 ignition[899]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 07:09:29.376692 systemd[1]: Starting systemd-networkd.service - Network Configuration... Jul 2 07:09:29.362147 ignition[899]: parsed url from cmdline: "" Jul 2 07:09:29.390034 systemd-networkd[909]: lo: Link UP Jul 2 07:09:29.586450 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jul 2 07:09:29.586552 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Jul 2 07:09:29.362149 ignition[899]: no config URL provided Jul 2 07:09:29.390036 systemd-networkd[909]: lo: Gained carrier Jul 2 07:09:29.362152 ignition[899]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:09:29.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.390319 systemd-networkd[909]: Enumeration completed Jul 2 07:09:29.688404 kernel: audit: type=1130 audit(1719904169.628:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.362166 ignition[899]: parsing config with SHA512: bd3907d4f5cfc4fa443a6cd57037d9cbdb689f24461850b05dc6477ada8dd14f32c71e5ff28e3325df3c8b87790867ad99f2e5d422d0d25161f804fca3db7f0e Jul 2 07:09:29.390577 systemd[1]: Started systemd-networkd.service - Network Configuration. Jul 2 07:09:29.365865 ignition[899]: fetch-offline: fetch-offline passed Jul 2 07:09:29.391332 systemd-networkd[909]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:09:29.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.731463 iscsid[940]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:09:29.731463 iscsid[940]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:09:29.731463 iscsid[940]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:09:29.731463 iscsid[940]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:09:29.731463 iscsid[940]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:09:29.731463 iscsid[940]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:09:29.731463 iscsid[940]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:09:29.884571 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Jul 2 07:09:29.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.365867 ignition[899]: POST message to Packet Timeline Jul 2 07:09:29.398590 systemd[1]: Finished ignition-fetch-offline.service - Ignition (fetch-offline). Jul 2 07:09:29.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:29.365870 ignition[899]: POST Status error: resource requires networking Jul 2 07:09:29.460570 systemd[1]: Reached target network.target - Network. Jul 2 07:09:29.365907 ignition[899]: Ignition finished successfully Jul 2 07:09:29.523546 systemd[1]: ignition-fetch.service - Ignition (fetch) was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 2 07:09:29.545734 ignition[926]: Ignition 2.15.0 Jul 2 07:09:29.538594 systemd[1]: Starting ignition-kargs.service - Ignition (kargs)... Jul 2 07:09:29.545737 ignition[926]: Stage: kargs Jul 2 07:09:29.562998 systemd[1]: Starting iscsiuio.service - iSCSI UserSpace I/O driver... Jul 2 07:09:29.545791 ignition[926]: no configs at "/usr/lib/ignition/base.d" Jul 2 07:09:29.574486 systemd-networkd[909]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:09:29.545797 ignition[926]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 07:09:29.606649 systemd[1]: Started iscsiuio.service - iSCSI UserSpace I/O driver. Jul 2 07:09:29.546200 ignition[926]: kargs: kargs passed Jul 2 07:09:29.683431 systemd[1]: Starting iscsid.service - Open-iSCSI... Jul 2 07:09:29.546203 ignition[926]: POST message to Packet Timeline Jul 2 07:09:29.695487 systemd[1]: Started iscsid.service - Open-iSCSI. Jul 2 07:09:29.546213 ignition[926]: GET https://metadata.packet.net/metadata: attempt #1 Jul 2 07:09:29.726563 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Jul 2 07:09:29.546705 ignition[926]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:49579->[::1]:53: read: connection refused Jul 2 07:09:29.741638 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Jul 2 07:09:29.747103 ignition[926]: GET https://metadata.packet.net/metadata: attempt #2 Jul 2 07:09:29.753620 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Jul 2 07:09:29.747530 ignition[926]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37815->[::1]:53: read: connection refused Jul 2 07:09:29.789569 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jul 2 07:09:30.148110 ignition[926]: GET https://metadata.packet.net/metadata: attempt #3 Jul 2 07:09:29.822715 systemd-networkd[909]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:09:30.149037 ignition[926]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51078->[::1]:53: read: connection refused Jul 2 07:09:29.823467 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jul 2 07:09:29.851603 systemd-networkd[909]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:09:29.873772 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Jul 2 07:09:29.881279 systemd-networkd[909]: enp1s0f1np1: Link UP Jul 2 07:09:29.881759 systemd-networkd[909]: enp1s0f1np1: Gained carrier Jul 2 07:09:29.893834 systemd-networkd[909]: enp1s0f0np0: Link UP Jul 2 07:09:29.894212 systemd-networkd[909]: eno2: Link UP Jul 2 07:09:29.894734 systemd-networkd[909]: eno1: Link UP Jul 2 07:09:29.897809 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Jul 2 07:09:30.644938 systemd-networkd[909]: enp1s0f0np0: Gained carrier Jul 2 07:09:30.653583 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Jul 2 07:09:30.688539 systemd-networkd[909]: enp1s0f0np0: DHCPv4 address 147.75.203.55/31, gateway 147.75.203.54 acquired from 145.40.83.140 Jul 2 07:09:30.949685 ignition[926]: GET https://metadata.packet.net/metadata: attempt #4 Jul 2 07:09:30.950714 ignition[926]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:55201->[::1]:53: read: connection refused Jul 2 07:09:31.580925 systemd-networkd[909]: enp1s0f1np1: Gained IPv6LL Jul 2 07:09:31.836917 systemd-networkd[909]: enp1s0f0np0: Gained IPv6LL Jul 2 07:09:32.551582 ignition[926]: GET https://metadata.packet.net/metadata: attempt #5 Jul 2 07:09:32.552608 ignition[926]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51501->[::1]:53: read: connection refused Jul 2 07:09:35.755372 ignition[926]: GET https://metadata.packet.net/metadata: attempt #6 Jul 2 07:09:35.790061 ignition[926]: GET result: OK Jul 2 07:09:35.985200 ignition[926]: Ignition finished successfully Jul 2 07:09:35.989777 systemd[1]: Finished ignition-kargs.service - Ignition (kargs). Jul 2 07:09:36.016471 kernel: kauditd_printk_skb: 3 callbacks suppressed Jul 2 07:09:36.016486 kernel: audit: type=1130 audit(1719904176.001:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:36.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:36.087631 systemd[1]: Starting ignition-disks.service - Ignition (disks)... Jul 2 07:09:36.094051 ignition[957]: Ignition 2.15.0 Jul 2 07:09:36.094055 ignition[957]: Stage: disks Jul 2 07:09:36.094113 ignition[957]: no configs at "/usr/lib/ignition/base.d" Jul 2 07:09:36.094119 ignition[957]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 07:09:36.094634 ignition[957]: disks: disks passed Jul 2 07:09:36.094637 ignition[957]: POST message to Packet Timeline Jul 2 07:09:36.094647 ignition[957]: GET https://metadata.packet.net/metadata: attempt #1 Jul 2 07:09:36.120738 ignition[957]: GET result: OK Jul 2 07:09:36.311252 ignition[957]: Ignition finished successfully Jul 2 07:09:36.313685 systemd[1]: Finished ignition-disks.service - Ignition (disks). Jul 2 07:09:36.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:36.328943 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Jul 2 07:09:36.420570 kernel: audit: type=1130 audit(1719904176.327:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:36.402518 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Jul 2 07:09:36.402630 systemd[1]: Reached target local-fs.target - Local File Systems. Jul 2 07:09:36.430566 systemd[1]: Reached target sysinit.target - System Initialization. Jul 2 07:09:36.453540 systemd[1]: Reached target basic.target - Basic System. Jul 2 07:09:36.484710 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT... Jul 2 07:09:36.522941 systemd-fsck[973]: ROOT: clean, 14/553520 files, 52654/553472 blocks Jul 2 07:09:36.536234 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT. Jul 2 07:09:36.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:36.602541 kernel: audit: type=1130 audit(1719904176.544:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:36.611611 systemd[1]: Mounting sysroot.mount - /sysroot... Jul 2 07:09:36.696058 systemd[1]: Mounted sysroot.mount - /sysroot. Jul 2 07:09:36.711564 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Quota mode: none. Jul 2 07:09:36.704600 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Jul 2 07:09:36.727432 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Jul 2 07:09:36.810409 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (980) Jul 2 07:09:36.810423 kernel: BTRFS info (device sdb6): first mount of filesystem f7c77bfb-d479-47f3-a34e-515c95184b74 Jul 2 07:09:36.810430 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:09:36.810437 kernel: BTRFS info (device sdb6): using free space tree Jul 2 07:09:36.810444 kernel: BTRFS info (device sdb6): enabling ssd optimizations Jul 2 07:09:36.819606 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr... Jul 2 07:09:36.869203 systemd[1]: Starting flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent... Jul 2 07:09:36.886893 systemd[1]: Starting flatcar-static-network.service - Flatcar Static Network Agent... Jul 2 07:09:36.906438 systemd[1]: ignition-remount-sysroot.service - Remount /sysroot read-write for Ignition was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:09:36.946612 coreos-metadata[1000]: Jul 02 07:09:36.928 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 07:09:36.906460 systemd[1]: Reached target ignition-diskful.target - Ignition Boot Disk Setup. Jul 2 07:09:36.984586 coreos-metadata[999]: Jul 02 07:09:36.928 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 07:09:36.984586 coreos-metadata[999]: Jul 02 07:09:36.948 INFO Fetch successful Jul 2 07:09:36.984586 coreos-metadata[999]: Jul 02 07:09:36.969 INFO wrote hostname ci-3815.2.5-a-4b9119b1c5 to /sysroot/etc/hostname Jul 2 07:09:37.181525 kernel: audit: type=1130 audit(1719904176.993:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.181541 kernel: audit: type=1130 audit(1719904177.058:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.181548 kernel: audit: type=1131 audit(1719904177.058:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:36.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.181673 coreos-metadata[1000]: Jul 02 07:09:36.948 INFO Fetch successful Jul 2 07:09:36.928208 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Jul 2 07:09:36.954462 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr. Jul 2 07:09:36.974658 systemd[1]: Finished flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent. Jul 2 07:09:37.228584 initrd-setup-root[1012]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:09:36.994671 systemd[1]: flatcar-static-network.service: Deactivated successfully. Jul 2 07:09:37.250577 initrd-setup-root[1019]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:09:36.994715 systemd[1]: Finished flatcar-static-network.service - Flatcar Static Network Agent. Jul 2 07:09:37.272627 initrd-setup-root[1026]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:09:37.169656 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup... Jul 2 07:09:37.293573 initrd-setup-root[1033]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:09:37.411956 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup. Jul 2 07:09:37.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.479530 kernel: audit: type=1130 audit(1719904177.421:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.488611 systemd[1]: Starting ignition-mount.service - Ignition (mount)... Jul 2 07:09:37.528416 kernel: BTRFS info (device sdb6): last unmount of filesystem f7c77bfb-d479-47f3-a34e-515c95184b74 Jul 2 07:09:37.506803 systemd[1]: Starting sysroot-boot.service - /sysroot/boot... Jul 2 07:09:37.537292 systemd[1]: sysroot-oem.mount: Deactivated successfully. Jul 2 07:09:37.553735 systemd[1]: Finished sysroot-boot.service - /sysroot/boot. Jul 2 07:09:37.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.595547 ignition[1131]: INFO : Ignition 2.15.0 Jul 2 07:09:37.595547 ignition[1131]: INFO : Stage: mount Jul 2 07:09:37.595547 ignition[1131]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 07:09:37.595547 ignition[1131]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 07:09:37.595547 ignition[1131]: INFO : mount: mount passed Jul 2 07:09:37.595547 ignition[1131]: INFO : POST message to Packet Timeline Jul 2 07:09:37.595547 ignition[1131]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jul 2 07:09:37.685547 kernel: audit: type=1130 audit(1719904177.565:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.685594 ignition[1131]: INFO : GET result: OK Jul 2 07:09:37.842744 ignition[1131]: INFO : Ignition finished successfully Jul 2 07:09:37.845557 systemd[1]: Finished ignition-mount.service - Ignition (mount). Jul 2 07:09:37.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.920394 kernel: audit: type=1130 audit(1719904177.861:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:37.929619 systemd[1]: Starting ignition-files.service - Ignition (files)... Jul 2 07:09:37.940340 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Jul 2 07:09:38.010438 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1147) Jul 2 07:09:38.010454 kernel: BTRFS info (device sdb6): first mount of filesystem f7c77bfb-d479-47f3-a34e-515c95184b74 Jul 2 07:09:38.028272 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:09:38.052027 kernel: BTRFS info (device sdb6): using free space tree Jul 2 07:09:38.097328 kernel: BTRFS info (device sdb6): enabling ssd optimizations Jul 2 07:09:38.098118 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Jul 2 07:09:38.121618 ignition[1166]: INFO : Ignition 2.15.0 Jul 2 07:09:38.121618 ignition[1166]: INFO : Stage: files Jul 2 07:09:38.137447 ignition[1166]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 07:09:38.137447 ignition[1166]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 07:09:38.137447 ignition[1166]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:09:38.137447 ignition[1166]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:09:38.137447 ignition[1166]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(4): [started] processing unit "flanneld.service" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(4): op(5): [started] writing systemd drop-in "50-network-config.conf" at "/sysroot/etc/systemd/system/flanneld.service.d/50-network-config.conf" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(4): op(5): [finished] writing systemd drop-in "50-network-config.conf" at "/sysroot/etc/systemd/system/flanneld.service.d/50-network-config.conf" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(4): [finished] processing unit "flanneld.service" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(6): [started] processing unit "etcd-member.service" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(6): op(7): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(6): op(7): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(6): [finished] processing unit "etcd-member.service" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(8): [started] processing unit "flannel-docker-opts.service" Jul 2 07:09:38.137447 ignition[1166]: INFO : files: op(8): op(9): [started] writing systemd drop-in "retry.conf" at "/sysroot/etc/systemd/system/flannel-docker-opts.service.d/retry.conf" Jul 2 07:09:38.480527 kernel: audit: type=1130 audit(1719904178.340:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.125451 unknown[1166]: wrote ssh authorized keys file for user: core Jul 2 07:09:38.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(8): op(9): [finished] writing systemd drop-in "retry.conf" at "/sysroot/etc/systemd/system/flannel-docker-opts.service.d/retry.conf" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(8): [finished] processing unit "flannel-docker-opts.service" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(a): [started] processing unit "docker.service" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(a): [finished] processing unit "docker.service" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(b): [started] setting preset to enabled for "docker.service" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(b): [finished] setting preset to enabled for "docker.service" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(c): [started] setting preset to enabled for "etcd-member.service" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(c): [finished] setting preset to enabled for "etcd-member.service" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(d): [started] setting preset to enabled for "flanneld.service" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: op(d): [finished] setting preset to enabled for "flanneld.service" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: createResultFile: createFiles: op(e): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: createResultFile: createFiles: op(e): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:09:38.501036 ignition[1166]: INFO : files: files passed Jul 2 07:09:38.501036 ignition[1166]: INFO : POST message to Packet Timeline Jul 2 07:09:38.501036 ignition[1166]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jul 2 07:09:38.501036 ignition[1166]: INFO : GET result: OK Jul 2 07:09:38.501036 ignition[1166]: INFO : Ignition finished successfully Jul 2 07:09:38.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.338413 systemd[1]: Finished ignition-files.service - Ignition (files). Jul 2 07:09:38.402700 systemd[1]: Starting ignition-quench.service - Ignition (record completion)... Jul 2 07:09:38.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.447478 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion... Jul 2 07:09:38.875935 initrd-setup-root-after-ignition[1203]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:09:38.875935 initrd-setup-root-after-ignition[1203]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:09:38.454678 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:09:38.940974 initrd-setup-root-after-ignition[1207]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:09:38.454752 systemd[1]: Finished ignition-quench.service - Ignition (record completion). Jul 2 07:09:38.491467 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion. Jul 2 07:09:38.511064 systemd[1]: Reached target ignition-complete.target - Ignition Complete. Jul 2 07:09:38.548809 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root... Jul 2 07:09:38.601431 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:09:38.601692 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root. Jul 2 07:09:38.609982 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Jul 2 07:09:39.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.641664 systemd[1]: Reached target initrd.target - Initrd Default Target. Jul 2 07:09:38.665806 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met. Jul 2 07:09:39.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.675811 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Jul 2 07:09:39.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.712506 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jul 2 07:09:38.735860 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Jul 2 07:09:38.762454 systemd[1]: Stopped target network.target - Network. Jul 2 07:09:38.764066 systemd[1]: Stopped target nss-lookup.target - Host and Network Name Lookups. Jul 2 07:09:38.791035 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Jul 2 07:09:38.809073 systemd[1]: Stopped target timers.target - Timer Units. Jul 2 07:09:38.827039 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:09:39.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.827440 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jul 2 07:09:39.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.845354 systemd[1]: Stopped target initrd.target - Initrd Default Target. Jul 2 07:09:39.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.865037 systemd[1]: Stopped target basic.target - Basic System. Jul 2 07:09:38.884046 systemd[1]: Stopped target ignition-complete.target - Ignition Complete. Jul 2 07:09:38.899194 systemd[1]: Stopped target ignition-diskful.target - Ignition Boot Disk Setup. Jul 2 07:09:39.384427 ignition[1221]: INFO : Ignition 2.15.0 Jul 2 07:09:39.384427 ignition[1221]: INFO : Stage: umount Jul 2 07:09:39.384427 ignition[1221]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 07:09:39.384427 ignition[1221]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 07:09:39.384427 ignition[1221]: INFO : umount: umount passed Jul 2 07:09:39.384427 ignition[1221]: INFO : POST message to Packet Timeline Jul 2 07:09:39.384427 ignition[1221]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jul 2 07:09:39.384427 ignition[1221]: INFO : GET result: OK Jul 2 07:09:39.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.933028 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Jul 2 07:09:39.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.951042 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Jul 2 07:09:39.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:38.975032 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Jul 2 07:09:39.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.546000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:09:38.995059 systemd[1]: Stopped target sysinit.target - System Initialization. Jul 2 07:09:39.017053 systemd[1]: Stopped target local-fs.target - Local File Systems. Jul 2 07:09:39.588608 ignition[1221]: INFO : Ignition finished successfully Jul 2 07:09:39.037034 systemd[1]: Stopped target local-fs-pre.target - Preparation for Local File Systems. Jul 2 07:09:39.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.058031 systemd[1]: Stopped target swap.target - Swaps. Jul 2 07:09:39.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.074920 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:09:39.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.075298 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Jul 2 07:09:39.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.096248 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Jul 2 07:09:39.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.115922 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:09:39.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.116297 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Jul 2 07:09:39.136156 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:09:39.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.136549 systemd[1]: Stopped ignition-fetch-offline.service - Ignition (fetch-offline). Jul 2 07:09:39.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.159252 systemd[1]: Stopped target paths.target - Path Units. Jul 2 07:09:39.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.178896 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:09:39.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.179306 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jul 2 07:09:39.200019 systemd[1]: Stopped target slices.target - Slice Units. Jul 2 07:09:39.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.221029 systemd[1]: Stopped target sockets.target - Socket Units. Jul 2 07:09:39.237010 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:09:39.237283 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket. Jul 2 07:09:39.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.257060 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:09:39.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.257321 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jul 2 07:09:39.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.278103 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:09:39.278517 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion. Jul 2 07:09:39.297131 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:09:39.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.297516 systemd[1]: Stopped ignition-files.service - Ignition (files). Jul 2 07:09:40.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.315135 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 07:09:40.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.315531 systemd[1]: Stopped flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent. Jul 2 07:09:40.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.347171 systemd[1]: Stopping ignition-mount.service - Ignition (mount)... Jul 2 07:09:40.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:40.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:39.379580 systemd[1]: Stopping sysroot-boot.service - /sysroot/boot... Jul 2 07:09:39.392744 systemd[1]: Stopping systemd-networkd.service - Network Configuration... Jul 2 07:09:39.402451 systemd-networkd[909]: enp1s0f1np1: DHCPv6 lease lost Jul 2 07:09:39.413705 systemd[1]: Stopping systemd-resolved.service - Network Name Resolution... Jul 2 07:09:39.416394 systemd-networkd[909]: enp1s0f0np0: DHCPv6 lease lost Jul 2 07:09:40.126000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:09:39.441544 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:09:39.441884 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Jul 2 07:09:40.183058 iscsid[940]: iscsid shutting down. Jul 2 07:09:39.461169 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:09:39.461564 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Jul 2 07:09:39.488577 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:09:39.491667 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:09:39.491918 systemd[1]: Stopped systemd-resolved.service - Network Name Resolution. Jul 2 07:09:40.183345 systemd-journald[268]: Received SIGTERM from PID 1 (systemd). Jul 2 07:09:39.509275 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:09:39.509575 systemd[1]: Stopped systemd-networkd.service - Network Configuration. Jul 2 07:09:39.528940 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:09:39.529166 systemd[1]: Stopped sysroot-boot.service - /sysroot/boot. Jul 2 07:09:39.547833 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:09:39.548026 systemd[1]: Closed systemd-networkd.socket - Network Service Netlink Socket. Jul 2 07:09:39.586789 systemd[1]: Stopping network-cleanup.service - Network Cleanup... Jul 2 07:09:39.596550 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:09:39.596807 systemd[1]: Stopped parse-ip-for-networkd.service - Write systemd-networkd units from cmdline. Jul 2 07:09:39.615683 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:09:39.615814 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Jul 2 07:09:39.637136 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:09:39.637285 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Jul 2 07:09:39.653733 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jul 2 07:09:39.653883 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jul 2 07:09:39.675305 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Jul 2 07:09:39.675549 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:09:39.676584 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:09:39.676630 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Jul 2 07:09:39.691638 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:09:39.691688 systemd[1]: Stopped ignition-mount.service - Ignition (mount). Jul 2 07:09:39.724796 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:09:39.724868 systemd[1]: Stopped ignition-disks.service - Ignition (disks). Jul 2 07:09:39.740775 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:09:39.740892 systemd[1]: Stopped ignition-kargs.service - Ignition (kargs). Jul 2 07:09:39.761737 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:09:39.761872 systemd[1]: Stopped ignition-setup.service - Ignition (setup). Jul 2 07:09:39.782814 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:09:39.782971 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup. Jul 2 07:09:39.801053 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Jul 2 07:09:39.821395 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:09:39.821755 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Jul 2 07:09:39.844180 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:09:39.844282 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Jul 2 07:09:39.861721 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:09:39.861818 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Jul 2 07:09:39.879684 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:09:39.879826 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Jul 2 07:09:39.897659 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:09:39.897793 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Jul 2 07:09:39.915642 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:09:39.915788 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jul 2 07:09:39.944811 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Jul 2 07:09:39.963525 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 07:09:39.963680 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jul 2 07:09:39.985963 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:09:39.986091 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Jul 2 07:09:40.003636 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:09:40.003769 systemd[1]: Stopped systemd-vconsole-setup.service - Setup Virtual Console. Jul 2 07:09:40.025233 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 07:09:40.026740 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:09:40.026990 systemd[1]: Stopped network-cleanup.service - Network Cleanup. Jul 2 07:09:40.043152 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:09:40.043398 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Jul 2 07:09:40.063948 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Jul 2 07:09:40.098823 systemd[1]: Starting initrd-switch-root.service - Switch Root... Jul 2 07:09:40.119680 systemd[1]: Switching root. Jul 2 07:09:40.185291 systemd-journald[268]: Journal stopped Jul 2 07:09:43.030472 kernel: SELinux: Permission cmd in class io_uring not defined in policy. Jul 2 07:09:43.030485 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:09:43.030492 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:09:43.030499 kernel: SELinux: policy capability open_perms=1 Jul 2 07:09:43.030504 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:09:43.030509 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:09:43.030515 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:09:43.030520 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:09:43.030525 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:09:43.030530 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:09:43.030536 systemd[1]: Successfully loaded SELinux policy in 278.680ms. Jul 2 07:09:43.030544 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.931ms. Jul 2 07:09:43.030550 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:09:43.030557 systemd[1]: Detected architecture x86-64. Jul 2 07:09:43.030563 systemd[1]: Detected first boot. Jul 2 07:09:43.030570 systemd[1]: Hostname set to . Jul 2 07:09:43.030576 systemd[1]: Initializing machine ID from random generator. Jul 2 07:09:43.030582 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:09:43.030588 kernel: kauditd_printk_skb: 46 callbacks suppressed Jul 2 07:09:43.030594 kernel: audit: type=1334 audit(1719904181.089:88): prog-id=12 op=LOAD Jul 2 07:09:43.030600 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:09:43.030606 kernel: audit: type=1334 audit(1719904181.089:89): prog-id=3 op=UNLOAD Jul 2 07:09:43.030613 systemd[1]: Stopped iscsiuio.service - iSCSI UserSpace I/O driver. Jul 2 07:09:43.030619 kernel: audit: type=1334 audit(1719904181.089:90): prog-id=13 op=LOAD Jul 2 07:09:43.030624 kernel: audit: type=1334 audit(1719904181.089:91): prog-id=14 op=LOAD Jul 2 07:09:43.030630 kernel: audit: type=1334 audit(1719904181.089:92): prog-id=4 op=UNLOAD Jul 2 07:09:43.030635 kernel: audit: type=1334 audit(1719904181.089:93): prog-id=5 op=UNLOAD Jul 2 07:09:43.030641 kernel: audit: type=1334 audit(1719904181.089:94): prog-id=15 op=LOAD Jul 2 07:09:43.030646 kernel: audit: type=1334 audit(1719904181.089:95): prog-id=12 op=UNLOAD Jul 2 07:09:43.030652 kernel: audit: type=1334 audit(1719904181.089:96): prog-id=16 op=LOAD Jul 2 07:09:43.030658 kernel: audit: type=1334 audit(1719904181.089:97): prog-id=17 op=LOAD Jul 2 07:09:43.030664 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:09:43.030670 systemd[1]: Stopped iscsid.service - Open-iSCSI. Jul 2 07:09:43.030675 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:09:43.030681 systemd[1]: Stopped initrd-switch-root.service - Switch Root. Jul 2 07:09:43.030688 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:09:43.030694 systemd[1]: Created slice system-addon\x2dconfig.slice - Slice /system/addon-config. Jul 2 07:09:43.030701 systemd[1]: Created slice system-addon\x2drun.slice - Slice /system/addon-run. Jul 2 07:09:43.030707 systemd[1]: Created slice system-getty.slice - Slice /system/getty. Jul 2 07:09:43.030714 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Jul 2 07:09:43.030721 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Jul 2 07:09:43.030728 systemd[1]: Created slice system-system\x2dcloudinit.slice - Slice /system/system-cloudinit. Jul 2 07:09:43.030735 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Jul 2 07:09:43.030741 systemd[1]: Created slice user.slice - User and Session Slice. Jul 2 07:09:43.030747 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jul 2 07:09:43.030753 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Jul 2 07:09:43.030760 systemd[1]: Set up automount boot.automount - Boot partition Automount Point. Jul 2 07:09:43.030767 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Jul 2 07:09:43.030774 systemd[1]: Stopped target initrd-switch-root.target - Switch Root. Jul 2 07:09:43.030780 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems. Jul 2 07:09:43.030786 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System. Jul 2 07:09:43.030793 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Jul 2 07:09:43.030799 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jul 2 07:09:43.030806 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jul 2 07:09:43.030812 systemd[1]: Reached target slices.target - Slice Units. Jul 2 07:09:43.030819 systemd[1]: Reached target swap.target - Swaps. Jul 2 07:09:43.030825 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Jul 2 07:09:43.030832 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket. Jul 2 07:09:43.030838 systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Jul 2 07:09:43.030844 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Jul 2 07:09:43.030851 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jul 2 07:09:43.030859 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jul 2 07:09:43.030865 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket. Jul 2 07:09:43.030872 systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Jul 2 07:09:43.030878 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Jul 2 07:09:43.030884 systemd[1]: Mounting media.mount - External Media Directory... Jul 2 07:09:43.030892 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:09:43.030899 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Jul 2 07:09:43.030905 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Jul 2 07:09:43.030912 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... Jul 2 07:09:43.030918 systemd[1]: Starting flatcar-tmpfiles.service - Create missing system files... Jul 2 07:09:43.030925 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jul 2 07:09:43.030931 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jul 2 07:09:43.030938 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Jul 2 07:09:43.030945 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jul 2 07:09:43.030951 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jul 2 07:09:43.030958 kernel: ACPI: bus type drm_connector registered Jul 2 07:09:43.030964 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jul 2 07:09:43.030970 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Jul 2 07:09:43.030976 kernel: fuse: init (API version 7.37) Jul 2 07:09:43.030982 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jul 2 07:09:43.030989 kernel: loop: module loaded Jul 2 07:09:43.030995 systemd[1]: setup-nsswitch.service - Create /etc/nsswitch.conf was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:09:43.031002 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:09:43.031009 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device. Jul 2 07:09:43.031016 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:09:43.031022 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:09:43.031029 systemd[1]: Stopped systemd-journald.service - Journal Service. Jul 2 07:09:43.031035 systemd[1]: systemd-journald.service: Consumed 1.067s CPU time. Jul 2 07:09:43.031041 systemd[1]: Starting systemd-journald.service - Journal Service... Jul 2 07:09:43.031049 systemd-journald[1364]: Journal started Jul 2 07:09:43.031074 systemd-journald[1364]: Runtime Journal (/run/log/journal/7fbb7fe2e6db47cc932d250109ba48dd) is 8.0M, max 639.9M, 631.9M free. Jul 2 07:09:40.503000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:09:40.756000 audit: BPF prog-id=10 op=LOAD Jul 2 07:09:40.756000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:09:40.756000 audit: BPF prog-id=11 op=LOAD Jul 2 07:09:40.756000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:09:41.089000 audit: BPF prog-id=12 op=LOAD Jul 2 07:09:41.089000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:09:41.089000 audit: BPF prog-id=13 op=LOAD Jul 2 07:09:41.089000 audit: BPF prog-id=14 op=LOAD Jul 2 07:09:41.089000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:09:41.089000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:09:41.089000 audit: BPF prog-id=15 op=LOAD Jul 2 07:09:41.089000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:09:41.089000 audit: BPF prog-id=16 op=LOAD Jul 2 07:09:41.089000 audit: BPF prog-id=17 op=LOAD Jul 2 07:09:41.089000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:09:41.089000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:09:41.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:41.303000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:09:41.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:41.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:41.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:41.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:42.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:42.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:42.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:42.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.002000 audit: BPF prog-id=18 op=LOAD Jul 2 07:09:43.003000 audit: BPF prog-id=19 op=LOAD Jul 2 07:09:43.003000 audit: BPF prog-id=20 op=LOAD Jul 2 07:09:43.003000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:09:43.003000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:09:43.027000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:09:43.027000 audit[1364]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffce67e6820 a2=4000 a3=7ffce67e68bc items=0 ppid=1 pid=1364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:09:43.027000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:09:41.078784 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:09:41.078791 systemd[1]: Unnecessary job was removed for dev-sdb6.device - /dev/sdb6. Jul 2 07:09:41.091732 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:09:41.091878 systemd[1]: systemd-journald.service: Consumed 1.067s CPU time. Jul 2 07:09:43.071532 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jul 2 07:09:43.104372 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Jul 2 07:09:43.147531 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Jul 2 07:09:43.178384 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jul 2 07:09:43.211119 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:09:43.211140 systemd[1]: Stopped verity-setup.service. Jul 2 07:09:43.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.271374 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:09:43.291531 systemd[1]: Started systemd-journald.service - Journal Service. Jul 2 07:09:43.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.300987 systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Jul 2 07:09:43.311688 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Jul 2 07:09:43.321601 systemd[1]: Mounted media.mount - External Media Directory. Jul 2 07:09:43.331604 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Jul 2 07:09:43.341582 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Jul 2 07:09:43.351571 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp. Jul 2 07:09:43.359715 systemd[1]: Finished flatcar-tmpfiles.service - Create missing system files. Jul 2 07:09:43.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.369766 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jul 2 07:09:43.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.379853 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:09:43.380029 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Jul 2 07:09:43.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.390080 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:09:43.390361 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jul 2 07:09:43.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.401311 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:09:43.401711 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jul 2 07:09:43.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.412298 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:09:43.412760 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jul 2 07:09:43.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.423275 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:09:43.423661 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Jul 2 07:09:43.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.434400 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:09:43.434766 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jul 2 07:09:43.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.445279 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jul 2 07:09:43.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.456307 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Jul 2 07:09:43.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.467292 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Jul 2 07:09:43.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.478466 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jul 2 07:09:43.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.490268 systemd[1]: Reached target network-pre.target - Preparation for Network. Jul 2 07:09:43.516737 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Jul 2 07:09:43.527172 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Jul 2 07:09:43.537533 systemd[1]: remount-root.service - Remount Root File System was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:09:43.538645 systemd[1]: Starting systemd-hwdb-update.service - Rebuild Hardware Database... Jul 2 07:09:43.549279 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Jul 2 07:09:43.552900 systemd-journald[1364]: Time spent on flushing to /var/log/journal/7fbb7fe2e6db47cc932d250109ba48dd is 15.098ms for 1531 entries. Jul 2 07:09:43.552900 systemd-journald[1364]: System Journal (/var/log/journal/7fbb7fe2e6db47cc932d250109ba48dd) is 8.0M, max 195.6M, 187.6M free. Jul 2 07:09:43.596874 systemd-journald[1364]: Received client request to flush runtime journal. Jul 2 07:09:43.566443 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:09:43.567279 systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Jul 2 07:09:43.583454 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jul 2 07:09:43.584172 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jul 2 07:09:43.609522 systemd[1]: Starting systemd-sysusers.service - Create System Users... Jul 2 07:09:43.620137 systemd[1]: Starting systemd-udev-settle.service - Wait for udev To Complete Device Initialization... Jul 2 07:09:43.630610 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Jul 2 07:09:43.640482 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Jul 2 07:09:43.650493 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Jul 2 07:09:43.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.660545 systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Jul 2 07:09:43.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.670557 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jul 2 07:09:43.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.680541 systemd[1]: Finished systemd-sysusers.service - Create System Users. Jul 2 07:09:43.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.691579 systemd[1]: Reached target first-boot-complete.target - First Boot Complete. Jul 2 07:09:43.717511 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jul 2 07:09:43.728511 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jul 2 07:09:43.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.739670 udevadm[1380]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 07:09:43.906589 systemd[1]: Finished systemd-hwdb-update.service - Rebuild Hardware Database. Jul 2 07:09:43.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.915000 audit: BPF prog-id=21 op=LOAD Jul 2 07:09:43.915000 audit: BPF prog-id=22 op=LOAD Jul 2 07:09:43.915000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:09:43.915000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:09:43.925680 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jul 2 07:09:43.936693 systemd-udevd[1384]: Using default interface naming scheme 'v252'. Jul 2 07:09:43.950561 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jul 2 07:09:43.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:43.962909 systemd[1]: Condition check resulted in dev-ttyS1.device - /dev/ttyS1 being skipped. Jul 2 07:09:43.962000 audit: BPF prog-id=23 op=LOAD Jul 2 07:09:43.975336 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Jul 2 07:09:43.975402 kernel: BTRFS info: devid 1 device path /dev/mapper/usr changed to /dev/dm-0 scanned by (udev-worker) (1391) Jul 2 07:09:43.985336 kernel: ACPI: button: Sleep Button [SLPB] Jul 2 07:09:43.985400 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 35 scanned by (udev-worker) (1448) Jul 2 07:09:44.006677 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Jul 2 07:09:44.074454 systemd[1]: Starting systemd-networkd.service - Network Configuration... Jul 2 07:09:44.079333 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:09:44.079368 kernel: IPMI message handler: version 39.2 Jul 2 07:09:44.110390 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:09:44.151337 kernel: ipmi device interface Jul 2 07:09:44.152420 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5300_MTFDDAK480TDT OEM. Jul 2 07:09:44.165000 audit: BPF prog-id=24 op=LOAD Jul 2 07:09:44.165000 audit: BPF prog-id=25 op=LOAD Jul 2 07:09:44.165000 audit: BPF prog-id=26 op=LOAD Jul 2 07:09:44.185637 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Jul 2 07:09:44.230474 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Jul 2 07:09:44.230557 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Jul 2 07:09:44.230638 kernel: ipmi_si: IPMI System Interface driver Jul 2 07:09:44.230651 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Jul 2 07:09:44.230725 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Jul 2 07:09:44.230799 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Jul 2 07:09:44.230862 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Jul 2 07:09:44.230874 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Jul 2 07:09:44.230884 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Jul 2 07:09:44.451530 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Jul 2 07:09:44.451629 kernel: iTCO_vendor_support: vendor-support=0 Jul 2 07:09:44.451646 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Jul 2 07:09:44.451720 kernel: ipmi_si: Adding ACPI-specified kcs state machine Jul 2 07:09:44.451736 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Jul 2 07:09:44.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:44.289640 systemd[1]: Starting systemd-userdbd.service - User Database Manager... Jul 2 07:09:44.387595 systemd[1]: Started systemd-userdbd.service - User Database Manager. Jul 2 07:09:44.509685 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Jul 2 07:09:44.521802 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Jul 2 07:09:44.528761 systemd-networkd[1427]: bond0: netdev ready Jul 2 07:09:44.530985 systemd-networkd[1427]: lo: Link UP Jul 2 07:09:44.530988 systemd-networkd[1427]: lo: Gained carrier Jul 2 07:09:44.531464 systemd-networkd[1427]: Enumeration completed Jul 2 07:09:44.531555 systemd[1]: Started systemd-networkd.service - Network Configuration. Jul 2 07:09:44.531763 systemd-networkd[1427]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Jul 2 07:09:44.537394 systemd-networkd[1427]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:79:3d:91.network. Jul 2 07:09:44.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:44.550495 systemd[1]: Starting systemd-networkd-wait-online.service - Wait for Network to be Configured... Jul 2 07:09:44.587240 kernel: intel_rapl_common: Found RAPL domain package Jul 2 07:09:44.587291 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Jul 2 07:09:44.587394 kernel: intel_rapl_common: Found RAPL domain core Jul 2 07:09:44.616380 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Jul 2 07:09:44.616468 kernel: intel_rapl_common: Found RAPL domain dram Jul 2 07:09:44.785333 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Jul 2 07:09:44.804358 kernel: ipmi_ssif: IPMI SSIF Interface driver Jul 2 07:09:45.497373 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jul 2 07:09:45.520527 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Jul 2 07:09:45.522274 systemd-networkd[1427]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:79:3d:90.network. Jul 2 07:09:45.541167 systemd[1]: Finished systemd-udev-settle.service - Wait for udev To Complete Device Initialization. Jul 2 07:09:45.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:45.571527 systemd[1]: Starting lvm2-activation-early.service - Activation of LVM2 logical volumes... Jul 2 07:09:45.578531 lvm[1490]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:09:45.594368 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 07:09:45.623781 systemd[1]: Finished lvm2-activation-early.service - Activation of LVM2 logical volumes. Jul 2 07:09:45.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:45.633481 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jul 2 07:09:45.652465 systemd[1]: Starting lvm2-activation.service - Activation of LVM2 logical volumes... Jul 2 07:09:45.654600 lvm[1491]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:09:45.688760 systemd[1]: Finished lvm2-activation.service - Activation of LVM2 logical volumes. Jul 2 07:09:45.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:45.698438 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Jul 2 07:09:45.717402 systemd[1]: var-lib-machines.mount - Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:09:45.717416 systemd[1]: Reached target local-fs.target - Local File Systems. Jul 2 07:09:45.724329 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 07:09:45.733429 systemd[1]: Reached target machines.target - Containers. Jul 2 07:09:45.755488 systemd[1]: Starting ldconfig.service - Rebuild Dynamic Linker Cache... Jul 2 07:09:45.765463 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jul 2 07:09:45.765486 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:09:45.766114 systemd[1]: Starting systemd-boot-update.service - Automatic Boot Loader Update... Jul 2 07:09:45.776196 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM... Jul 2 07:09:45.786190 systemd[1]: Starting systemd-machine-id-commit.service - Commit a transient machine-id on disk... Jul 2 07:09:45.787104 systemd[1]: Starting systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/... Jul 2 07:09:45.787322 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1493 (bootctl) Jul 2 07:09:45.788108 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service - File System Check on /dev/disk/by-label/EFI-SYSTEM... Jul 2 07:09:45.810330 kernel: loop0: detected capacity change from 0 to 8 Jul 2 07:09:45.826205 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:09:45.826592 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM. Jul 2 07:09:45.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:45.833842 systemd[1]: Finished systemd-machine-id-commit.service - Commit a transient machine-id on disk. Jul 2 07:09:45.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:45.834330 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:09:45.897247 systemd-fsck[1502]: fsck.fat 4.2 (2021-01-31) Jul 2 07:09:45.897247 systemd-fsck[1502]: /dev/sdb1: 808 files, 120378/258078 clusters Jul 2 07:09:45.897431 kernel: loop1: detected capacity change from 0 to 80600 Jul 2 07:09:45.898170 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service - File System Check on /dev/disk/by-label/EFI-SYSTEM. Jul 2 07:09:45.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:45.919458 systemd[1]: Mounting boot.mount - Boot partition... Jul 2 07:09:45.938588 systemd[1]: Mounted boot.mount - Boot partition. Jul 2 07:09:45.964332 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 07:09:45.988348 systemd[1]: Finished systemd-boot-update.service - Automatic Boot Loader Update. Jul 2 07:09:46.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:46.008335 kernel: loop2: detected capacity change from 0 to 139360 Jul 2 07:09:46.069109 ldconfig[1492]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:09:46.085354 kernel: loop3: detected capacity change from 0 to 8 Jul 2 07:09:46.085574 systemd[1]: Finished ldconfig.service - Rebuild Dynamic Linker Cache. Jul 2 07:09:46.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:46.103922 kernel: loop4: detected capacity change from 0 to 80600 Jul 2 07:09:46.103951 kernel: kauditd_printk_skb: 64 callbacks suppressed Jul 2 07:09:46.103965 kernel: audit: type=1130 audit(1719904186.099:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:46.121382 kernel: loop5: detected capacity change from 0 to 139360 Jul 2 07:09:46.192155 (sd-sysext)[1508]: Using extensions 'containerd-flatcar', 'docker-flatcar', 'oem-packet'. Jul 2 07:09:46.192356 (sd-sysext)[1508]: Merged extensions into '/usr'. Jul 2 07:09:46.193180 systemd[1]: Finished systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/. Jul 2 07:09:46.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:46.250544 kernel: audit: type=1130 audit(1719904186.201:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:46.259519 systemd[1]: Starting ensure-sysext.service... Jul 2 07:09:46.267030 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Jul 2 07:09:46.272455 systemd-tmpfiles[1510]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:09:46.273382 systemd-tmpfiles[1510]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:09:46.273573 systemd-tmpfiles[1510]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Jul 2 07:09:46.274043 systemd-tmpfiles[1510]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:09:46.282209 systemd[1]: Reloading. Jul 2 07:09:46.367370 systemd[1]: /usr/lib/systemd/system/docker.socket:6: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:09:46.398373 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Jul 2 07:09:46.437348 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Jul 2 07:09:46.437000 audit: BPF prog-id=27 op=LOAD Jul 2 07:09:46.442152 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Jul 2 07:09:46.437000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:09:46.453964 kernel: audit: type=1334 audit(1719904186.437:162): prog-id=27 op=LOAD Jul 2 07:09:46.453987 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Jul 2 07:09:46.454003 kernel: audit: type=1334 audit(1719904186.437:163): prog-id=23 op=UNLOAD Jul 2 07:09:46.437000 audit: BPF prog-id=28 op=LOAD Jul 2 07:09:46.469188 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Jul 2 07:09:46.469216 kernel: audit: type=1334 audit(1719904186.437:164): prog-id=28 op=LOAD Jul 2 07:09:46.469231 kernel: bond0: active interface up! Jul 2 07:09:46.476068 kernel: audit: type=1334 audit(1719904186.438:165): prog-id=29 op=LOAD Jul 2 07:09:46.438000 audit: BPF prog-id=29 op=LOAD Jul 2 07:09:46.479902 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Jul 2 07:09:46.438000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:09:46.493127 kernel: audit: type=1334 audit(1719904186.438:166): prog-id=21 op=UNLOAD Jul 2 07:09:46.494349 systemd-networkd[1427]: bond0: Link UP Jul 2 07:09:46.494623 systemd-networkd[1427]: enp1s0f1np1: Link UP Jul 2 07:09:46.494757 systemd-networkd[1427]: enp1s0f1np1: Gained carrier Jul 2 07:09:46.495789 systemd-networkd[1427]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:79:3d:90.network. Jul 2 07:09:46.438000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:09:46.438000 audit: BPF prog-id=30 op=LOAD Jul 2 07:09:46.438000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:09:46.438000 audit: BPF prog-id=31 op=LOAD Jul 2 07:09:46.438000 audit: BPF prog-id=32 op=LOAD Jul 2 07:09:46.438000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:09:46.438000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:09:46.439000 audit: BPF prog-id=33 op=LOAD Jul 2 07:09:46.439000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:09:46.439000 audit: BPF prog-id=34 op=LOAD Jul 2 07:09:46.439000 audit: BPF prog-id=35 op=LOAD Jul 2 07:09:46.439000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:09:46.439000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:09:46.613408 kernel: audit: type=1334 audit(1719904186.438:167): prog-id=22 op=UNLOAD Jul 2 07:09:46.613432 kernel: audit: type=1334 audit(1719904186.438:168): prog-id=30 op=LOAD Jul 2 07:09:46.613449 kernel: audit: type=1334 audit(1719904186.438:169): prog-id=18 op=UNLOAD Jul 2 07:09:46.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:09:46.695013 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Jul 2 07:09:46.706385 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.711000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:09:46.711000 audit[1601]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc5040420 a2=420 a3=0 items=0 ppid=1586 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:09:46.711000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:09:46.713433 augenrules[1601]: No rules Jul 2 07:09:46.724835 systemd[1]: Starting clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs... Jul 2 07:09:46.731386 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.751189 systemd[1]: Starting systemd-journal-catalog-update.service - Rebuild Journal Catalog... Jul 2 07:09:46.755355 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.775407 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Jul 2 07:09:46.777393 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.797474 systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Jul 2 07:09:46.801408 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.821052 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Jul 2 07:09:46.824384 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.847408 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.862706 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Jul 2 07:09:46.869385 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.887540 systemd[1]: Finished clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs. Jul 2 07:09:46.891366 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.909538 systemd[1]: Finished systemd-journal-catalog-update.service - Rebuild Journal Catalog. Jul 2 07:09:46.912374 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.933329 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.939203 systemd[1]: Starting systemd-update-done.service - Update is Completed... Jul 2 07:09:46.954388 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.972463 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:09:46.972962 systemd[1]: Finished systemd-update-done.service - Update is Completed. Jul 2 07:09:46.976329 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.994788 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Jul 2 07:09:46.997350 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:46.997323 systemd-networkd[1427]: enp1s0f0np0: Link UP Jul 2 07:09:46.997584 systemd-networkd[1427]: bond0: Gained carrier Jul 2 07:09:46.997721 systemd-networkd[1427]: enp1s0f0np0: Gained carrier Jul 2 07:09:47.005201 systemd-resolved[1608]: Positive Trust Anchors: Jul 2 07:09:47.005217 systemd-resolved[1608]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:09:47.005242 systemd-resolved[1608]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:09:47.010015 systemd-resolved[1608]: Using system hostname 'ci-3815.2.5-a-4b9119b1c5'. Jul 2 07:09:47.016576 systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Jul 2 07:09:47.018395 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 07:09:47.018420 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Jul 2 07:09:47.034569 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:47.034718 systemd-networkd[1427]: enp1s0f1np1: Link DOWN Jul 2 07:09:47.034721 systemd-networkd[1427]: enp1s0f1np1: Lost carrier Jul 2 07:09:47.042552 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:47.042734 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:47.042817 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Jul 2 07:09:47.053054 systemd[1]: Reached target network.target - Network. Jul 2 07:09:47.061433 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Jul 2 07:09:47.071431 systemd[1]: Reached target time-set.target - System Time Set. Jul 2 07:09:47.081406 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:09:47.081570 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jul 2 07:09:47.090501 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jul 2 07:09:47.101065 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jul 2 07:09:47.111006 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jul 2 07:09:47.120395 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jul 2 07:09:47.120475 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:09:47.120553 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:09:47.120613 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:09:47.121369 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:09:47.121445 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jul 2 07:09:47.131609 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:09:47.131672 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jul 2 07:09:47.141580 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:09:47.141641 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jul 2 07:09:47.152383 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:09:47.152543 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jul 2 07:09:47.163508 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jul 2 07:09:47.174014 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jul 2 07:09:47.186568 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jul 2 07:09:47.196467 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jul 2 07:09:47.196581 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:09:47.196681 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:09:47.196762 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:09:47.197675 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:09:47.197766 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jul 2 07:09:47.207596 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:09:47.207661 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jul 2 07:09:47.217582 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:09:47.217644 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jul 2 07:09:47.239380 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jul 2 07:09:47.247352 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Jul 2 07:09:47.247406 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Jul 2 07:09:47.248862 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:09:47.249043 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jul 2 07:09:47.272331 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Jul 2 07:09:47.273006 systemd-networkd[1427]: enp1s0f1np1: Link UP Jul 2 07:09:47.273009 systemd-networkd[1427]: enp1s0f1np1: Gained carrier Jul 2 07:09:47.306376 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Jul 2 07:09:47.307576 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jul 2 07:09:47.307620 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:47.307660 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:47.307762 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:47.307937 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:47.318093 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jul 2 07:09:47.328052 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jul 2 07:09:47.343541 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jul 2 07:09:47.353452 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jul 2 07:09:47.353522 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:09:47.353592 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:09:47.353641 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:09:47.354286 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:09:47.354383 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jul 2 07:09:47.363617 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:09:47.363680 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jul 2 07:09:47.373605 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:09:47.373668 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jul 2 07:09:47.383602 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:09:47.383665 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jul 2 07:09:47.393686 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:09:47.393738 systemd[1]: Reached target sysinit.target - System Initialization. Jul 2 07:09:47.403450 systemd[1]: Started motdgen.path - Watch for update engine configuration changes. Jul 2 07:09:47.413424 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path - Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jul 2 07:09:47.423480 systemd[1]: Started logrotate.timer - Daily rotation of log files. Jul 2 07:09:47.433492 systemd[1]: Started mdadm.timer - Weekly check for MD array's redundancy information.. Jul 2 07:09:47.443407 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Jul 2 07:09:47.453420 systemd[1]: update-engine-stub.timer - Update Engine Stub Timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:09:47.453442 systemd[1]: Reached target paths.target - Path Units. Jul 2 07:09:47.461417 systemd[1]: Reached target timers.target - Timer Units. Jul 2 07:09:47.469851 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Jul 2 07:09:47.479910 systemd[1]: Starting docker.socket - Docker Socket for the API... Jul 2 07:09:47.490054 systemd[1]: Listening on sshd.socket - OpenSSH Server Socket. Jul 2 07:09:47.499458 systemd[1]: systemd-pcrphase-sysinit.service - TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:09:47.499488 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jul 2 07:09:47.499795 systemd[1]: Finished ensure-sysext.service. Jul 2 07:09:47.507427 systemd[1]: Listening on docker.socket - Docker Socket for the API. Jul 2 07:09:47.516409 systemd-networkd[1427]: bond0: Gained IPv6LL Jul 2 07:09:47.516600 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:47.517818 systemd[1]: Reached target sockets.target - Socket Units. Jul 2 07:09:47.526361 systemd[1]: Reached target basic.target - Basic System. Jul 2 07:09:47.534457 systemd[1]: addon-config@oem.service - Configure Addon /oem was skipped because no trigger condition checks were met. Jul 2 07:09:47.534470 systemd[1]: addon-run@oem.service - Run Addon /oem was skipped because no trigger condition checks were met. Jul 2 07:09:47.548454 systemd[1]: Starting containerd.service - containerd container runtime... Jul 2 07:09:47.559758 systemd[1]: Starting coreos-metadata.service - Flatcar Metadata Agent... Jul 2 07:09:47.570814 systemd[1]: Starting dbus.service - D-Bus System Message Bus... Jul 2 07:09:47.581025 systemd[1]: Starting enable-oem-cloudinit.service - Enable cloudinit... Jul 2 07:09:47.583452 dbus-daemon[1629]: [system] SELinux support is enabled Jul 2 07:09:47.583620 jq[1630]: false Jul 2 07:09:47.597202 coreos-metadata[1626]: Jul 02 07:09:47.597 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 07:09:47.599478 systemd[1]: Starting extend-filesystems.service - Extend Filesystems... Jul 2 07:09:47.607224 extend-filesystems[1631]: Found loop3 Jul 2 07:09:47.607224 extend-filesystems[1631]: Found loop4 Jul 2 07:09:47.667440 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Jul 2 07:09:47.667457 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 35 scanned by (udev-worker) (1650) Jul 2 07:09:47.667479 extend-filesystems[1631]: Found loop5 Jul 2 07:09:47.667479 extend-filesystems[1631]: Found sda Jul 2 07:09:47.667479 extend-filesystems[1631]: Found sdb Jul 2 07:09:47.667479 extend-filesystems[1631]: Found sdb1 Jul 2 07:09:47.667479 extend-filesystems[1631]: Found sdb2 Jul 2 07:09:47.667479 extend-filesystems[1631]: Found sdb3 Jul 2 07:09:47.667479 extend-filesystems[1631]: Found usr Jul 2 07:09:47.667479 extend-filesystems[1631]: Found sdb4 Jul 2 07:09:47.667479 extend-filesystems[1631]: Found sdb6 Jul 2 07:09:47.667479 extend-filesystems[1631]: Found sdb7 Jul 2 07:09:47.667479 extend-filesystems[1631]: Found sdb9 Jul 2 07:09:47.667479 extend-filesystems[1631]: Checking size of /dev/sdb9 Jul 2 07:09:47.667479 extend-filesystems[1631]: Resized partition /dev/sdb9 Jul 2 07:09:47.609458 systemd[1]: flatcar-setup-environment.service - Modifies /etc/environment for CoreOS was skipped because of an unmet condition check (ConditionPathExists=/oem/bin/flatcar-setup-environment). Jul 2 07:09:47.780531 extend-filesystems[1640]: resize2fs 1.47.0 (5-Feb-2023) Jul 2 07:09:47.610127 systemd[1]: Starting motdgen.service - Generate /run/flatcar/motd... Jul 2 07:09:47.673442 systemd[1]: Starting ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline... Jul 2 07:09:47.686133 systemd[1]: Starting sshd-keygen.service - Generate sshd host keys... Jul 2 07:09:47.724497 systemd[1]: Starting systemd-logind.service - User Login Management... Jul 2 07:09:47.744401 systemd[1]: systemd-pcrphase.service - TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:09:47.745309 systemd-logind[1661]: Watching system buttons on /dev/input/event3 (Power Button) Jul 2 07:09:47.745320 systemd-logind[1661]: Watching system buttons on /dev/input/event2 (Sleep Button) Jul 2 07:09:47.745344 systemd-logind[1661]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Jul 2 07:09:47.745591 systemd-logind[1661]: New seat seat0. Jul 2 07:09:47.756486 systemd[1]: Starting tcsd.service - TCG Core Services Daemon... Jul 2 07:09:47.795760 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:09:47.805486 systemd[1]: Starting update-engine.service - Update Engine... Jul 2 07:09:47.812183 update_engine[1665]: I0702 07:09:47.812129 1665 main.cc:92] Flatcar Update Engine starting Jul 2 07:09:47.812987 update_engine[1665]: I0702 07:09:47.812942 1665 update_check_scheduler.cc:74] Next update check in 11m5s Jul 2 07:09:47.814121 systemd[1]: Starting update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition... Jul 2 07:09:47.815818 jq[1666]: true Jul 2 07:09:47.823637 systemd[1]: Started dbus.service - D-Bus System Message Bus. Jul 2 07:09:47.843533 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:09:47.843629 systemd[1]: Condition check resulted in enable-oem-cloudinit.service - Enable cloudinit being skipped. Jul 2 07:09:47.843828 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:09:47.843916 systemd[1]: Finished motdgen.service - Generate /run/flatcar/motd. Jul 2 07:09:47.853505 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:09:47.853591 systemd[1]: Finished ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline. Jul 2 07:09:47.874206 jq[1668]: true Jul 2 07:09:47.875788 dbus-daemon[1629]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 07:09:47.880124 systemd[1]: Started systemd-logind.service - User Login Management. Jul 2 07:09:47.889608 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Jul 2 07:09:47.889702 systemd[1]: Condition check resulted in tcsd.service - TCG Core Services Daemon being skipped. Jul 2 07:09:47.891876 systemd[1]: Started update-engine.service - Update Engine. Jul 2 07:09:47.902019 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service - Load cloud-config from /usr/share/oem/cloud-config.yml was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:09:47.902121 systemd[1]: Reached target system-config.target - Load system-provided cloud configs. Jul 2 07:09:47.911434 systemd[1]: user-cloudinit-proc-cmdline.service - Load cloud-config from url defined in /proc/cmdline was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:09:47.911509 systemd[1]: Reached target user-config.target - Load user-provided cloud configs. Jul 2 07:09:47.921833 bash[1687]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:09:47.937586 systemd[1]: Started locksmithd.service - Cluster reboot manager. Jul 2 07:09:47.949608 systemd[1]: Finished update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition. Jul 2 07:09:47.956881 locksmithd[1688]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:09:47.972525 systemd[1]: Starting sshkeys.service... Jul 2 07:09:47.982057 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice - Slice /system/coreos-metadata-sshkeys. Jul 2 07:09:48.002637 systemd[1]: Starting coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys)... Jul 2 07:09:48.023274 containerd[1669]: time="2024-07-02T07:09:48.023205359Z" level=info msg="starting containerd" revision=99b8088b873ba42b788f29ccd0dc26ebb6952f1e version=v1.7.13 Jul 2 07:09:48.034986 coreos-metadata[1700]: Jul 02 07:09:48.034 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 07:09:48.037682 containerd[1669]: time="2024-07-02T07:09:48.037636514Z" level=info msg="loading plugin \"io.containerd.warning.v1.deprecations\"..." type=io.containerd.warning.v1 Jul 2 07:09:48.037682 containerd[1669]: time="2024-07-02T07:09:48.037656434Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038446 containerd[1669]: time="2024-07-02T07:09:48.038377833Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/6.1.96-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038446 containerd[1669]: time="2024-07-02T07:09:48.038396715Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038558 containerd[1669]: time="2024-07-02T07:09:48.038518248Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038558 containerd[1669]: time="2024-07-02T07:09:48.038528751Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:09:48.038611 containerd[1669]: time="2024-07-02T07:09:48.038570898Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038611 containerd[1669]: time="2024-07-02T07:09:48.038604214Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." error="no scratch file generator: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038645 containerd[1669]: time="2024-07-02T07:09:48.038612730Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038661 containerd[1669]: time="2024-07-02T07:09:48.038648781Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038805 containerd[1669]: time="2024-07-02T07:09:48.038762427Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038805 containerd[1669]: time="2024-07-02T07:09:48.038772820Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:09:48.038805 containerd[1669]: time="2024-07-02T07:09:48.038778566Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038869 containerd[1669]: time="2024-07-02T07:09:48.038835973Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:09:48.038869 containerd[1669]: time="2024-07-02T07:09:48.038847424Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:09:48.038905 containerd[1669]: time="2024-07-02T07:09:48.038874325Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:09:48.038905 containerd[1669]: time="2024-07-02T07:09:48.038882662Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:09:48.049853 containerd[1669]: time="2024-07-02T07:09:48.049814059Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:09:48.049853 containerd[1669]: time="2024-07-02T07:09:48.049829175Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:09:48.049853 containerd[1669]: time="2024-07-02T07:09:48.049838079Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:09:48.049853 containerd[1669]: time="2024-07-02T07:09:48.049853014Z" level=info msg="loading plugin \"io.containerd.lease.v1.manager\"..." type=io.containerd.lease.v1 Jul 2 07:09:48.049926 containerd[1669]: time="2024-07-02T07:09:48.049861477Z" level=info msg="loading plugin \"io.containerd.nri.v1.nri\"..." type=io.containerd.nri.v1 Jul 2 07:09:48.049926 containerd[1669]: time="2024-07-02T07:09:48.049867936Z" level=info msg="NRI interface is disabled by configuration." Jul 2 07:09:48.049926 containerd[1669]: time="2024-07-02T07:09:48.049874581Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:09:48.049977 containerd[1669]: time="2024-07-02T07:09:48.049934743Z" level=info msg="loading plugin \"io.containerd.runtime.v2.shim\"..." type=io.containerd.runtime.v2 Jul 2 07:09:48.049977 containerd[1669]: time="2024-07-02T07:09:48.049944654Z" level=info msg="loading plugin \"io.containerd.sandbox.store.v1.local\"..." type=io.containerd.sandbox.store.v1 Jul 2 07:09:48.049977 containerd[1669]: time="2024-07-02T07:09:48.049951754Z" level=info msg="loading plugin \"io.containerd.sandbox.controller.v1.local\"..." type=io.containerd.sandbox.controller.v1 Jul 2 07:09:48.049977 containerd[1669]: time="2024-07-02T07:09:48.049966466Z" level=info msg="loading plugin \"io.containerd.streaming.v1.manager\"..." type=io.containerd.streaming.v1 Jul 2 07:09:48.049977 containerd[1669]: time="2024-07-02T07:09:48.049975088Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:09:48.050048 containerd[1669]: time="2024-07-02T07:09:48.049985285Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:09:48.050048 containerd[1669]: time="2024-07-02T07:09:48.049992733Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:09:48.050048 containerd[1669]: time="2024-07-02T07:09:48.049999707Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:09:48.050048 containerd[1669]: time="2024-07-02T07:09:48.050007120Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:09:48.050048 containerd[1669]: time="2024-07-02T07:09:48.050014130Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:09:48.050048 containerd[1669]: time="2024-07-02T07:09:48.050021698Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:09:48.050048 containerd[1669]: time="2024-07-02T07:09:48.050028640Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:09:48.050145 containerd[1669]: time="2024-07-02T07:09:48.050085145Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:09:48.050225 containerd[1669]: time="2024-07-02T07:09:48.050215907Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:09:48.050246 containerd[1669]: time="2024-07-02T07:09:48.050230921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050246 containerd[1669]: time="2024-07-02T07:09:48.050238532Z" level=info msg="loading plugin \"io.containerd.transfer.v1.local\"..." type=io.containerd.transfer.v1 Jul 2 07:09:48.050283 containerd[1669]: time="2024-07-02T07:09:48.050250776Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:09:48.050283 containerd[1669]: time="2024-07-02T07:09:48.050279329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050316 containerd[1669]: time="2024-07-02T07:09:48.050287494Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050316 containerd[1669]: time="2024-07-02T07:09:48.050294597Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050316 containerd[1669]: time="2024-07-02T07:09:48.050301538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050316 containerd[1669]: time="2024-07-02T07:09:48.050308647Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050316 containerd[1669]: time="2024-07-02T07:09:48.050315528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050399 containerd[1669]: time="2024-07-02T07:09:48.050321990Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050399 containerd[1669]: time="2024-07-02T07:09:48.050335748Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050399 containerd[1669]: time="2024-07-02T07:09:48.050347253Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:09:48.050445 containerd[1669]: time="2024-07-02T07:09:48.050412084Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandbox-controllers\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050445 containerd[1669]: time="2024-07-02T07:09:48.050421886Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandboxes\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050445 containerd[1669]: time="2024-07-02T07:09:48.050428525Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050445 containerd[1669]: time="2024-07-02T07:09:48.050435315Z" level=info msg="loading plugin \"io.containerd.grpc.v1.streaming\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050445 containerd[1669]: time="2024-07-02T07:09:48.050441775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050518 containerd[1669]: time="2024-07-02T07:09:48.050449095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.transfer\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050518 containerd[1669]: time="2024-07-02T07:09:48.050455710Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050518 containerd[1669]: time="2024-07-02T07:09:48.050461646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:09:48.050664 containerd[1669]: time="2024-07-02T07:09:48.050604717Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.8 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:09:48.050664 containerd[1669]: time="2024-07-02T07:09:48.050637052Z" level=info msg="Connect containerd service" Jul 2 07:09:48.050664 containerd[1669]: time="2024-07-02T07:09:48.050650571Z" level=info msg="using legacy CRI server" Jul 2 07:09:48.050664 containerd[1669]: time="2024-07-02T07:09:48.050654595Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this" Jul 2 07:09:48.050816 containerd[1669]: time="2024-07-02T07:09:48.050684922Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:09:48.050981 containerd[1669]: time="2024-07-02T07:09:48.050942384Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:09:48.050981 containerd[1669]: time="2024-07-02T07:09:48.050964207Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:09:48.050981 containerd[1669]: time="2024-07-02T07:09:48.050974540Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:09:48.050981 containerd[1669]: time="2024-07-02T07:09:48.050980948Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:09:48.051063 containerd[1669]: time="2024-07-02T07:09:48.050986684Z" level=info msg="skipping tracing processor initialization (no tracing plugin)" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:09:48.051131 containerd[1669]: time="2024-07-02T07:09:48.051081761Z" level=info msg="Start subscribing containerd event" Jul 2 07:09:48.051131 containerd[1669]: time="2024-07-02T07:09:48.051113748Z" level=info msg="Start recovering state" Jul 2 07:09:48.051173 containerd[1669]: time="2024-07-02T07:09:48.051165175Z" level=info msg="Start event monitor" Jul 2 07:09:48.051194 containerd[1669]: time="2024-07-02T07:09:48.051168456Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:09:48.051211 containerd[1669]: time="2024-07-02T07:09:48.051174797Z" level=info msg="Start snapshots syncer" Jul 2 07:09:48.051235 containerd[1669]: time="2024-07-02T07:09:48.051229021Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:09:48.051253 containerd[1669]: time="2024-07-02T07:09:48.051236073Z" level=info msg="Start streaming server" Jul 2 07:09:48.051270 containerd[1669]: time="2024-07-02T07:09:48.051199365Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:09:48.051320 containerd[1669]: time="2024-07-02T07:09:48.051312865Z" level=info msg="containerd successfully booted in 0.028710s" Jul 2 07:09:48.051355 systemd[1]: Started containerd.service - containerd container runtime. Jul 2 07:09:48.205360 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Jul 2 07:09:48.231994 extend-filesystems[1640]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Jul 2 07:09:48.231994 extend-filesystems[1640]: old_desc_blocks = 1, new_desc_blocks = 56 Jul 2 07:09:48.231994 extend-filesystems[1640]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Jul 2 07:09:48.270419 extend-filesystems[1631]: Resized filesystem in /dev/sdb9 Jul 2 07:09:48.232419 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:09:48.232512 systemd[1]: Finished extend-filesystems.service - Extend Filesystems. Jul 2 07:09:48.515312 sshd_keygen[1660]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:09:48.527754 systemd[1]: Finished sshd-keygen.service - Generate sshd host keys. Jul 2 07:09:48.540715 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:48.540789 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:48.552670 systemd[1]: Starting issuegen.service - Generate /run/issue... Jul 2 07:09:48.560718 systemd[1]: Finished systemd-networkd-wait-online.service - Wait for Network to be Configured. Jul 2 07:09:48.570976 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:09:48.571074 systemd[1]: Finished issuegen.service - Generate /run/issue. Jul 2 07:09:48.580648 systemd[1]: Reached target network-online.target - Network is Online. Jul 2 07:09:48.598588 systemd[1]: Starting nvidia.service - NVIDIA Configure Service... Jul 2 07:09:48.607162 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Jul 2 07:09:48.616814 systemd[1]: Finished nvidia.service - NVIDIA Configure Service. Jul 2 07:09:48.626688 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Jul 2 07:09:48.643611 systemd[1]: Started getty@tty1.service - Getty on tty1. Jul 2 07:09:48.652346 systemd[1]: Started serial-getty@ttyS1.service - Serial Getty on ttyS1. Jul 2 07:09:48.661561 systemd[1]: Reached target getty.target - Login Prompts. Jul 2 07:09:50.208852 kernel: mlx5_core 0000:01:00.0: lag map: port 1:1 port 2:2 Jul 2 07:09:50.208979 kernel: mlx5_core 0000:01:00.0: shared_fdb:0 mode:queue_affinity Jul 2 07:09:53.687561 login[1736]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Jul 2 07:09:53.688035 login[1735]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 07:09:53.693360 systemd-logind[1661]: New session 1 of user core. Jul 2 07:09:53.694240 systemd[1]: Created slice user-500.slice - User Slice of UID 500. Jul 2 07:09:53.711738 systemd[1]: Starting user-runtime-dir@500.service - User Runtime Directory /run/user/500... Jul 2 07:09:53.718998 systemd[1]: Finished user-runtime-dir@500.service - User Runtime Directory /run/user/500. Jul 2 07:09:53.720212 systemd[1]: Starting user@500.service - User Manager for UID 500... Jul 2 07:09:53.722314 (systemd)[1740]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:09:53.724768 coreos-metadata[1626]: Jul 02 07:09:53.724 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jul 2 07:09:53.724942 coreos-metadata[1700]: Jul 02 07:09:53.724 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jul 2 07:09:53.780577 systemd[1740]: Queued start job for default target default.target. Jul 2 07:09:53.789700 systemd[1740]: Reached target paths.target - Paths. Jul 2 07:09:53.789711 systemd[1740]: Reached target sockets.target - Sockets. Jul 2 07:09:53.789719 systemd[1740]: Reached target timers.target - Timers. Jul 2 07:09:53.789726 systemd[1740]: Reached target basic.target - Basic System. Jul 2 07:09:53.789746 systemd[1740]: Reached target default.target - Main User Target. Jul 2 07:09:53.789761 systemd[1740]: Startup finished in 63ms. Jul 2 07:09:53.789793 systemd[1]: Started user@500.service - User Manager for UID 500. Jul 2 07:09:53.790691 systemd[1]: Started session-1.scope - Session 1 of User core. Jul 2 07:09:53.937006 kernel: mlx5_core 0000:01:00.0: lag map: port 1:2 port 2:2 Jul 2 07:09:53.937159 kernel: mlx5_core 0000:01:00.0: lag map: port 1:1 port 2:2 Jul 2 07:09:54.693177 login[1736]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 07:09:54.695942 systemd-logind[1661]: New session 2 of user core. Jul 2 07:09:54.707612 systemd[1]: Started session-2.scope - Session 2 of User core. Jul 2 07:09:54.724942 coreos-metadata[1700]: Jul 02 07:09:54.724 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jul 2 07:09:54.725225 coreos-metadata[1626]: Jul 02 07:09:54.724 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jul 2 07:09:54.747442 coreos-metadata[1700]: Jul 02 07:09:54.747 INFO Fetch successful Jul 2 07:09:54.748728 coreos-metadata[1626]: Jul 02 07:09:54.748 INFO Fetch successful Jul 2 07:09:54.790881 unknown[1700]: wrote ssh authorized keys file for user: core Jul 2 07:09:54.802766 systemd[1]: Finished coreos-metadata.service - Flatcar Metadata Agent. Jul 2 07:09:54.803923 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Jul 2 07:09:54.804857 systemd[1]: Starting packet-phone-home.service - Report Success to Packet... Jul 2 07:09:54.847295 update-ssh-keys[1761]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:09:54.848905 systemd[1]: Finished coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys). Jul 2 07:09:54.853792 systemd[1]: Finished sshkeys.service. Jul 2 07:09:54.957150 systemd[1]: Created slice system-sshd.slice - Slice /system/sshd. Jul 2 07:09:54.957908 systemd[1]: Started sshd@0-147.75.203.55:22-139.178.89.65:33054.service - OpenSSH per-connection server daemon (139.178.89.65:33054). Jul 2 07:09:54.960025 systemd[1]: Starting docker.service - Docker Application Container Engine... Jul 2 07:09:54.988882 sshd[1778]: Accepted publickey for core from 139.178.89.65 port 33054 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:09:54.989616 sshd[1778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:09:54.992558 systemd-logind[1661]: New session 3 of user core. Jul 2 07:09:55.008507 systemd[1]: Started session-3.scope - Session 3 of User core. Jul 2 07:09:55.109078 systemd[1]: Finished packet-phone-home.service - Report Success to Packet. Jul 2 07:09:55.110183 systemd[1]: Started sshd@1-147.75.203.55:22-139.178.89.65:33064.service - OpenSSH per-connection server daemon (139.178.89.65:33064). Jul 2 07:09:55.139301 sshd[1789]: Accepted publickey for core from 139.178.89.65 port 33064 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:09:55.140223 sshd[1789]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:09:55.142771 systemd-logind[1661]: New session 4 of user core. Jul 2 07:09:55.159865 systemd[1]: Started session-4.scope - Session 4 of User core. Jul 2 07:09:55.223958 sshd[1789]: pam_unix(sshd:session): session closed for user core Jul 2 07:09:55.232723 systemd[1]: sshd@1-147.75.203.55:22-139.178.89.65:33064.service: Deactivated successfully. Jul 2 07:09:55.233072 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:09:55.233389 systemd-logind[1661]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:09:55.234038 systemd[1]: Started sshd@2-147.75.203.55:22-139.178.89.65:33066.service - OpenSSH per-connection server daemon (139.178.89.65:33066). Jul 2 07:09:55.234467 systemd-logind[1661]: Removed session 4. Jul 2 07:09:55.237319 dockerd[1779]: time="2024-07-02T07:09:55.237295356Z" level=info msg="Starting up" Jul 2 07:09:55.255845 dockerd[1779]: time="2024-07-02T07:09:55.255824257Z" level=info msg="Loading containers: start." Jul 2 07:09:55.262282 sshd[1807]: Accepted publickey for core from 139.178.89.65 port 33066 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:09:55.263044 sshd[1807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:09:55.265033 systemd-logind[1661]: New session 5 of user core. Jul 2 07:09:55.274472 systemd[1]: Started session-5.scope - Session 5 of User core. Jul 2 07:09:55.316402 kernel: Initializing XFRM netlink socket Jul 2 07:09:55.322212 sshd[1807]: pam_unix(sshd:session): session closed for user core Jul 2 07:09:55.323364 systemd[1]: sshd@2-147.75.203.55:22-139.178.89.65:33066.service: Deactivated successfully. Jul 2 07:09:55.323739 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:09:55.324046 systemd-logind[1661]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:09:55.324505 systemd-logind[1661]: Removed session 5. Jul 2 07:09:55.333034 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:55.333086 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:55.336599 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:55.336682 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:55.375254 systemd-networkd[1427]: docker0: Link UP Jul 2 07:09:55.375533 systemd-timesyncd[1609]: Network configuration changed, trying to establish connection. Jul 2 07:09:55.385910 dockerd[1779]: time="2024-07-02T07:09:55.385835050Z" level=info msg="Loading containers: done." Jul 2 07:09:55.544159 dockerd[1779]: time="2024-07-02T07:09:55.544030191Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:09:55.544346 dockerd[1779]: time="2024-07-02T07:09:55.544280966Z" level=info msg="Docker daemon" commit=fca702de7f71362c8d103073c7e4a1d0a467fadd graphdriver=overlay2 version=24.0.9 Jul 2 07:09:55.544486 dockerd[1779]: time="2024-07-02T07:09:55.544424519Z" level=info msg="Daemon has completed initialization" Jul 2 07:09:55.575943 dockerd[1779]: time="2024-07-02T07:09:55.575883049Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:09:55.576062 systemd[1]: Started docker.service - Docker Application Container Engine. Jul 2 07:09:55.577071 etcd-wrapper[1768]: Error response from daemon: No such container: etcd-member Jul 2 07:09:55.595959 etcd-wrapper[1922]: Error response from daemon: No such container: etcd-member Jul 2 07:09:55.631733 etcd-wrapper[1942]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Jul 2 07:09:56.862210 etcd-wrapper[1942]: v3.5.0: Pulling from coreos/etcd Jul 2 07:09:57.168798 etcd-wrapper[1942]: 1813d21adc01: Pulling fs layer Jul 2 07:09:57.168798 etcd-wrapper[1942]: 6e96907ab677: Pulling fs layer Jul 2 07:09:57.168798 etcd-wrapper[1942]: 444ed0ea8673: Pulling fs layer Jul 2 07:09:57.168798 etcd-wrapper[1942]: 0fd2df5633f0: Pulling fs layer Jul 2 07:09:57.169447 etcd-wrapper[1942]: 8cc22b9456bb: Pulling fs layer Jul 2 07:09:57.169447 etcd-wrapper[1942]: 7ac70aecd290: Pulling fs layer Jul 2 07:09:57.169447 etcd-wrapper[1942]: 4b376c64dfe4: Pulling fs layer Jul 2 07:09:57.169447 etcd-wrapper[1942]: 0fd2df5633f0: Waiting Jul 2 07:09:57.169447 etcd-wrapper[1942]: 8cc22b9456bb: Waiting Jul 2 07:09:57.169447 etcd-wrapper[1942]: 7ac70aecd290: Waiting Jul 2 07:09:57.572169 etcd-wrapper[1942]: 444ed0ea8673: Verifying Checksum Jul 2 07:09:57.572169 etcd-wrapper[1942]: 444ed0ea8673: Download complete Jul 2 07:09:57.583843 etcd-wrapper[1942]: 6e96907ab677: Verifying Checksum Jul 2 07:09:57.583843 etcd-wrapper[1942]: 6e96907ab677: Download complete Jul 2 07:09:57.625737 etcd-wrapper[1942]: 1813d21adc01: Verifying Checksum Jul 2 07:09:57.625737 etcd-wrapper[1942]: 1813d21adc01: Download complete Jul 2 07:09:57.902812 etcd-wrapper[1942]: 8cc22b9456bb: Verifying Checksum Jul 2 07:09:57.902812 etcd-wrapper[1942]: 8cc22b9456bb: Download complete Jul 2 07:09:57.920596 etcd-wrapper[1942]: 7ac70aecd290: Verifying Checksum Jul 2 07:09:57.920596 etcd-wrapper[1942]: 7ac70aecd290: Download complete Jul 2 07:09:57.932215 etcd-wrapper[1942]: 0fd2df5633f0: Verifying Checksum Jul 2 07:09:57.932215 etcd-wrapper[1942]: 0fd2df5633f0: Download complete Jul 2 07:09:57.965506 etcd-wrapper[1942]: 1813d21adc01: Pull complete Jul 2 07:09:58.081473 systemd[1]: var-lib-docker-overlay2-decef1c94941b8728e76caae74fea5f00af349038c4022d07ed5d513da1bae16-merged.mount: Deactivated successfully. Jul 2 07:09:58.252521 etcd-wrapper[1942]: 4b376c64dfe4: Verifying Checksum Jul 2 07:09:58.252521 etcd-wrapper[1942]: 4b376c64dfe4: Download complete Jul 2 07:09:58.314881 etcd-wrapper[1942]: 6e96907ab677: Pull complete Jul 2 07:09:58.405104 systemd[1]: var-lib-docker-overlay2-164dc92b6ca95c4360f8aadd24a4e8bb990f9cb8f4f834d4e1a1d5414e16704a-merged.mount: Deactivated successfully. Jul 2 07:09:58.446000 etcd-wrapper[1942]: 444ed0ea8673: Pull complete Jul 2 07:09:58.550440 etcd-wrapper[1942]: 0fd2df5633f0: Pull complete Jul 2 07:09:58.575674 etcd-wrapper[1942]: 8cc22b9456bb: Pull complete Jul 2 07:09:58.592089 etcd-wrapper[1942]: 7ac70aecd290: Pull complete Jul 2 07:09:58.609833 etcd-wrapper[1942]: 4b376c64dfe4: Pull complete Jul 2 07:09:58.618009 etcd-wrapper[1942]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Jul 2 07:09:58.620180 etcd-wrapper[1942]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Jul 2 07:09:58.906925 containerd[1669]: time="2024-07-02T07:09:58.906781994Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:09:58.906925 containerd[1669]: time="2024-07-02T07:09:58.906827376Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:09:58.907295 containerd[1669]: time="2024-07-02T07:09:58.907110301Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:09:58.907295 containerd[1669]: time="2024-07-02T07:09:58.907162706Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:09:58.938832 systemd[1]: Started docker-75a2d060cd2a6a81bfa4e4c4e0c65adbcc1b9ca129fdbc1d826e50cbf2603575.scope - libcontainer container 75a2d060cd2a6a81bfa4e4c4e0c65adbcc1b9ca129fdbc1d826e50cbf2603575. Jul 2 07:09:58.984380 systemd[1]: var-lib-docker-overlay2-b3b1c282ac4d91ee99d40907173f82e34f6900a67257f98b720b63903f4ace71-merged.mount: Deactivated successfully. Jul 2 07:09:59.016166 etcd-wrapper[1942]: {"level":"info","ts":1719904199.015959,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jul 2 07:09:59.016166 etcd-wrapper[1942]: {"level":"info","ts":1719904199.0160046,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"7fbb7fe2e6db47cc932d250109ba48dd"} Jul 2 07:09:59.016166 etcd-wrapper[1942]: {"level":"warn","ts":1719904199.0160222,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jul 2 07:09:59.016166 etcd-wrapper[1942]: {"level":"warn","ts":1719904199.0160267,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Jul 2 07:09:59.016166 etcd-wrapper[1942]: {"level":"warn","ts":1719904199.0160303,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jul 2 07:09:59.016166 etcd-wrapper[1942]: {"level":"warn","ts":1719904199.0160332,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jul 2 07:09:59.016166 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:09:59.016Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.25:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.25:2380","--advertise-client-urls=http://10.67.80.25:2379","--discovery=https://discovery.etcd.io/c7ddb73f7224e967ffe36df0a95559a7","--enable-v2=true"]} Jul 2 07:09:59.016557 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:09:59.016Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.25:2380"]} Jul 2 07:09:59.016557 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:09:59.016Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Jul 2 07:09:59.016557 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:09:59.016Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"7fbb7fe2e6db47cc932d250109ba48dd","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.25:2380"],"listen-peer-urls":["http://10.67.80.25:2380"],"advertise-client-urls":["http://10.67.80.25:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"7fbb7fe2e6db47cc932d250109ba48dd=http://10.67.80.25:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/c7ddb73f7224e967ffe36df0a95559a7","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/c7ddb73f7224e967ffe36df0a95559a7","discovery-proxy":"","downgrade-check-interval":"5s"} Jul 2 07:09:59.017113 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:09:59.017Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"540.612µs"} Jul 2 07:09:59.533456 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:09:59.532Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"31d2d136df99400d"} Jul 2 07:09:59.533456 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:09:59.532Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":1,"needed-peers":2} Jul 2 07:10:05.346698 systemd[1]: Started sshd@3-147.75.203.55:22-139.178.89.65:34906.service - OpenSSH per-connection server daemon (139.178.89.65:34906). Jul 2 07:10:05.376173 sshd[2045]: Accepted publickey for core from 139.178.89.65 port 34906 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:05.379455 sshd[2045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:05.390417 systemd-logind[1661]: New session 6 of user core. Jul 2 07:10:05.400788 systemd[1]: Started session-6.scope - Session 6 of User core. Jul 2 07:10:05.471916 sshd[2045]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:05.484826 systemd[1]: sshd@3-147.75.203.55:22-139.178.89.65:34906.service: Deactivated successfully. Jul 2 07:10:05.485183 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:10:05.485548 systemd-logind[1661]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:10:05.486240 systemd[1]: Started sshd@4-147.75.203.55:22-139.178.89.65:34916.service - OpenSSH per-connection server daemon (139.178.89.65:34916). Jul 2 07:10:05.486726 systemd-logind[1661]: Removed session 6. Jul 2 07:10:05.515574 sshd[2051]: Accepted publickey for core from 139.178.89.65 port 34916 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:05.516406 sshd[2051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:05.519575 systemd-logind[1661]: New session 7 of user core. Jul 2 07:10:05.528526 systemd[1]: Started session-7.scope - Session 7 of User core. Jul 2 07:10:05.584906 sshd[2051]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:05.586170 systemd[1]: sshd@4-147.75.203.55:22-139.178.89.65:34916.service: Deactivated successfully. Jul 2 07:10:05.586565 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:10:05.586905 systemd-logind[1661]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:10:05.587301 systemd-logind[1661]: Removed session 7. Jul 2 07:10:09.250671 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:10:09.250Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"49c0c2e9597dd6c7"} Jul 2 07:10:09.250671 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:10:09.250Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Jul 2 07:10:15.616683 systemd[1]: Started sshd@5-147.75.203.55:22-139.178.89.65:36296.service - OpenSSH per-connection server daemon (139.178.89.65:36296). Jul 2 07:10:15.645682 sshd[2057]: Accepted publickey for core from 139.178.89.65 port 36296 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:15.646474 sshd[2057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:15.649529 systemd-logind[1661]: New session 8 of user core. Jul 2 07:10:15.657547 systemd[1]: Started session-8.scope - Session 8 of User core. Jul 2 07:10:15.713582 sshd[2057]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:15.724920 systemd[1]: sshd@5-147.75.203.55:22-139.178.89.65:36296.service: Deactivated successfully. Jul 2 07:10:15.725276 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:10:15.725706 systemd-logind[1661]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:10:15.726356 systemd[1]: Started sshd@6-147.75.203.55:22-139.178.89.65:36298.service - OpenSSH per-connection server daemon (139.178.89.65:36298). Jul 2 07:10:15.726891 systemd-logind[1661]: Removed session 8. Jul 2 07:10:15.756786 sshd[2063]: Accepted publickey for core from 139.178.89.65 port 36298 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:15.757996 sshd[2063]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:15.762459 systemd-logind[1661]: New session 9 of user core. Jul 2 07:10:15.774820 systemd[1]: Started session-9.scope - Session 9 of User core. Jul 2 07:10:15.846598 sshd[2063]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:15.848067 systemd[1]: sshd@6-147.75.203.55:22-139.178.89.65:36298.service: Deactivated successfully. Jul 2 07:10:15.848477 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:10:15.848935 systemd-logind[1661]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:10:15.849532 systemd-logind[1661]: Removed session 9. Jul 2 07:10:26.175433 systemd-resolved[1608]: Clock change detected. Flushing caches. Jul 2 07:10:26.175782 systemd-timesyncd[1609]: Contacted time server [2604:2dc0:101:200::b9d]:123 (2.flatcar.pool.ntp.org). Jul 2 07:10:26.175965 systemd-timesyncd[1609]: Initial clock synchronization to Tue 2024-07-02 07:10:26.175278 UTC. Jul 2 07:10:26.306978 systemd[1]: Started sshd@7-147.75.203.55:22-139.178.89.65:59238.service - OpenSSH per-connection server daemon (139.178.89.65:59238). Jul 2 07:10:26.335689 sshd[2069]: Accepted publickey for core from 139.178.89.65 port 59238 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:26.336416 sshd[2069]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:26.339295 systemd-logind[1661]: New session 10 of user core. Jul 2 07:10:26.350804 systemd[1]: Started session-10.scope - Session 10 of User core. Jul 2 07:10:26.407331 sshd[2069]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:26.418066 systemd[1]: sshd@7-147.75.203.55:22-139.178.89.65:59238.service: Deactivated successfully. Jul 2 07:10:26.418459 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:10:26.418843 systemd-logind[1661]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:10:26.419564 systemd[1]: Started sshd@8-147.75.203.55:22-139.178.89.65:59248.service - OpenSSH per-connection server daemon (139.178.89.65:59248). Jul 2 07:10:26.420119 systemd-logind[1661]: Removed session 10. Jul 2 07:10:26.448853 sshd[2075]: Accepted publickey for core from 139.178.89.65 port 59248 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:26.449658 sshd[2075]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:26.452742 systemd-logind[1661]: New session 11 of user core. Jul 2 07:10:26.460857 systemd[1]: Started session-11.scope - Session 11 of User core. Jul 2 07:10:26.527761 sshd[2075]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:26.534127 systemd[1]: sshd@8-147.75.203.55:22-139.178.89.65:59248.service: Deactivated successfully. Jul 2 07:10:26.536303 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:10:26.538282 systemd-logind[1661]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:10:26.538785 systemd-logind[1661]: Removed session 11. Jul 2 07:10:33.507840 update_engine[1665]: I0702 07:10:33.507712 1665 update_attempter.cc:509] Updating boot flags... Jul 2 07:10:33.548610 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 35 scanned by (udev-worker) (2089) Jul 2 07:10:33.574595 kernel: BTRFS warning: duplicate device /dev/sdb3 devid 1 generation 35 scanned by (udev-worker) (2090) Jul 2 07:10:36.551565 systemd[1]: Started sshd@9-147.75.203.55:22-139.178.89.65:52890.service - OpenSSH per-connection server daemon (139.178.89.65:52890). Jul 2 07:10:36.584037 sshd[2099]: Accepted publickey for core from 139.178.89.65 port 52890 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:36.584801 sshd[2099]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:36.587788 systemd-logind[1661]: New session 12 of user core. Jul 2 07:10:36.596836 systemd[1]: Started session-12.scope - Session 12 of User core. Jul 2 07:10:36.653083 sshd[2099]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:36.664075 systemd[1]: sshd@9-147.75.203.55:22-139.178.89.65:52890.service: Deactivated successfully. Jul 2 07:10:36.664432 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:10:36.664798 systemd-logind[1661]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:10:36.665470 systemd[1]: Started sshd@10-147.75.203.55:22-139.178.89.65:52892.service - OpenSSH per-connection server daemon (139.178.89.65:52892). Jul 2 07:10:36.666001 systemd-logind[1661]: Removed session 12. Jul 2 07:10:36.695396 sshd[2105]: Accepted publickey for core from 139.178.89.65 port 52892 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:36.696526 sshd[2105]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:36.700934 systemd-logind[1661]: New session 13 of user core. Jul 2 07:10:36.708929 systemd[1]: Started session-13.scope - Session 13 of User core. Jul 2 07:10:36.785102 sshd[2105]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:36.791328 systemd[1]: sshd@10-147.75.203.55:22-139.178.89.65:52892.service: Deactivated successfully. Jul 2 07:10:36.793114 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:10:36.794794 systemd-logind[1661]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:10:36.797210 systemd-logind[1661]: Removed session 13. Jul 2 07:10:46.808952 systemd[1]: Started sshd@11-147.75.203.55:22-139.178.89.65:56034.service - OpenSSH per-connection server daemon (139.178.89.65:56034). Jul 2 07:10:46.837701 sshd[2111]: Accepted publickey for core from 139.178.89.65 port 56034 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:46.838650 sshd[2111]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:46.842390 systemd-logind[1661]: New session 14 of user core. Jul 2 07:10:46.850877 systemd[1]: Started session-14.scope - Session 14 of User core. Jul 2 07:10:46.909366 sshd[2111]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:46.917036 systemd[1]: sshd@11-147.75.203.55:22-139.178.89.65:56034.service: Deactivated successfully. Jul 2 07:10:46.917390 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:10:46.917773 systemd-logind[1661]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:10:46.918446 systemd[1]: Started sshd@12-147.75.203.55:22-139.178.89.65:56042.service - OpenSSH per-connection server daemon (139.178.89.65:56042). Jul 2 07:10:46.919010 systemd-logind[1661]: Removed session 14. Jul 2 07:10:46.947082 sshd[2117]: Accepted publickey for core from 139.178.89.65 port 56042 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:46.947908 sshd[2117]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:46.950990 systemd-logind[1661]: New session 15 of user core. Jul 2 07:10:46.959932 systemd[1]: Started session-15.scope - Session 15 of User core. Jul 2 07:10:47.027211 sshd[2117]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:47.033655 systemd[1]: sshd@12-147.75.203.55:22-139.178.89.65:56042.service: Deactivated successfully. Jul 2 07:10:47.035858 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:10:47.037812 systemd-logind[1661]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:10:47.040296 systemd-logind[1661]: Removed session 15. Jul 2 07:10:57.057942 systemd[1]: Started sshd@13-147.75.203.55:22-139.178.89.65:60274.service - OpenSSH per-connection server daemon (139.178.89.65:60274). Jul 2 07:10:57.086599 sshd[2123]: Accepted publickey for core from 139.178.89.65 port 60274 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:57.087444 sshd[2123]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:57.090488 systemd-logind[1661]: New session 16 of user core. Jul 2 07:10:57.098824 systemd[1]: Started session-16.scope - Session 16 of User core. Jul 2 07:10:57.154516 sshd[2123]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:57.162104 systemd[1]: sshd@13-147.75.203.55:22-139.178.89.65:60274.service: Deactivated successfully. Jul 2 07:10:57.162460 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 07:10:57.162851 systemd-logind[1661]: Session 16 logged out. Waiting for processes to exit. Jul 2 07:10:57.163531 systemd[1]: Started sshd@14-147.75.203.55:22-139.178.89.65:60282.service - OpenSSH per-connection server daemon (139.178.89.65:60282). Jul 2 07:10:57.164057 systemd-logind[1661]: Removed session 16. Jul 2 07:10:57.192489 sshd[2129]: Accepted publickey for core from 139.178.89.65 port 60282 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:10:57.193318 sshd[2129]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:10:57.196469 systemd-logind[1661]: New session 17 of user core. Jul 2 07:10:57.212875 systemd[1]: Started session-17.scope - Session 17 of User core. Jul 2 07:10:57.273442 sshd[2129]: pam_unix(sshd:session): session closed for user core Jul 2 07:10:57.274774 systemd[1]: sshd@14-147.75.203.55:22-139.178.89.65:60282.service: Deactivated successfully. Jul 2 07:10:57.275176 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 07:10:57.275502 systemd-logind[1661]: Session 17 logged out. Waiting for processes to exit. Jul 2 07:10:57.276149 systemd-logind[1661]: Removed session 17. Jul 2 07:11:07.288715 systemd[1]: Started sshd@15-147.75.203.55:22-139.178.89.65:52374.service - OpenSSH per-connection server daemon (139.178.89.65:52374). Jul 2 07:11:07.317937 sshd[2136]: Accepted publickey for core from 139.178.89.65 port 52374 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:07.318857 sshd[2136]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:07.322356 systemd-logind[1661]: New session 18 of user core. Jul 2 07:11:07.330874 systemd[1]: Started session-18.scope - Session 18 of User core. Jul 2 07:11:07.389172 sshd[2136]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:07.403085 systemd[1]: sshd@15-147.75.203.55:22-139.178.89.65:52374.service: Deactivated successfully. Jul 2 07:11:07.403462 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 07:11:07.403852 systemd-logind[1661]: Session 18 logged out. Waiting for processes to exit. Jul 2 07:11:07.404581 systemd[1]: Started sshd@16-147.75.203.55:22-139.178.89.65:52378.service - OpenSSH per-connection server daemon (139.178.89.65:52378). Jul 2 07:11:07.405204 systemd-logind[1661]: Removed session 18. Jul 2 07:11:07.434387 sshd[2142]: Accepted publickey for core from 139.178.89.65 port 52378 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:07.435222 sshd[2142]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:07.438298 systemd-logind[1661]: New session 19 of user core. Jul 2 07:11:07.456948 systemd[1]: Started session-19.scope - Session 19 of User core. Jul 2 07:11:07.528322 sshd[2142]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:07.534521 systemd[1]: sshd@16-147.75.203.55:22-139.178.89.65:52378.service: Deactivated successfully. Jul 2 07:11:07.536345 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 07:11:07.538086 systemd-logind[1661]: Session 19 logged out. Waiting for processes to exit. Jul 2 07:11:07.540545 systemd-logind[1661]: Removed session 19. Jul 2 07:11:17.552152 systemd[1]: Started sshd@17-147.75.203.55:22-139.178.89.65:35924.service - OpenSSH per-connection server daemon (139.178.89.65:35924). Jul 2 07:11:17.581033 sshd[2148]: Accepted publickey for core from 139.178.89.65 port 35924 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:17.581882 sshd[2148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:17.585180 systemd-logind[1661]: New session 20 of user core. Jul 2 07:11:17.593878 systemd[1]: Started session-20.scope - Session 20 of User core. Jul 2 07:11:17.650762 sshd[2148]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:17.668197 systemd[1]: sshd@17-147.75.203.55:22-139.178.89.65:35924.service: Deactivated successfully. Jul 2 07:11:17.668578 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 07:11:17.669081 systemd-logind[1661]: Session 20 logged out. Waiting for processes to exit. Jul 2 07:11:17.669821 systemd[1]: Started sshd@18-147.75.203.55:22-139.178.89.65:35936.service - OpenSSH per-connection server daemon (139.178.89.65:35936). Jul 2 07:11:17.670521 systemd-logind[1661]: Removed session 20. Jul 2 07:11:17.701724 sshd[2154]: Accepted publickey for core from 139.178.89.65 port 35936 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:17.703256 sshd[2154]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:17.709793 systemd-logind[1661]: New session 21 of user core. Jul 2 07:11:17.728094 systemd[1]: Started session-21.scope - Session 21 of User core. Jul 2 07:11:17.800609 sshd[2154]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:17.802058 systemd[1]: sshd@18-147.75.203.55:22-139.178.89.65:35936.service: Deactivated successfully. Jul 2 07:11:17.802459 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 07:11:17.802855 systemd-logind[1661]: Session 21 logged out. Waiting for processes to exit. Jul 2 07:11:17.803460 systemd-logind[1661]: Removed session 21. Jul 2 07:11:27.831943 systemd[1]: Started sshd@19-147.75.203.55:22-139.178.89.65:46212.service - OpenSSH per-connection server daemon (139.178.89.65:46212). Jul 2 07:11:27.861097 sshd[2160]: Accepted publickey for core from 139.178.89.65 port 46212 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:27.862140 sshd[2160]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:27.865830 systemd-logind[1661]: New session 22 of user core. Jul 2 07:11:27.884164 systemd[1]: Started session-22.scope - Session 22 of User core. Jul 2 07:11:27.954275 sshd[2160]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:27.965079 systemd[1]: sshd@19-147.75.203.55:22-139.178.89.65:46212.service: Deactivated successfully. Jul 2 07:11:27.965434 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 07:11:27.965876 systemd-logind[1661]: Session 22 logged out. Waiting for processes to exit. Jul 2 07:11:27.966569 systemd[1]: Started sshd@20-147.75.203.55:22-139.178.89.65:46220.service - OpenSSH per-connection server daemon (139.178.89.65:46220). Jul 2 07:11:27.967196 systemd-logind[1661]: Removed session 22. Jul 2 07:11:27.995986 sshd[2166]: Accepted publickey for core from 139.178.89.65 port 46220 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:27.996813 sshd[2166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:27.999671 systemd-logind[1661]: New session 23 of user core. Jul 2 07:11:28.007840 systemd[1]: Started session-23.scope - Session 23 of User core. Jul 2 07:11:28.064882 sshd[2166]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:28.066320 systemd[1]: sshd@20-147.75.203.55:22-139.178.89.65:46220.service: Deactivated successfully. Jul 2 07:11:28.066729 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 07:11:28.067117 systemd-logind[1661]: Session 23 logged out. Waiting for processes to exit. Jul 2 07:11:28.067576 systemd-logind[1661]: Removed session 23. Jul 2 07:11:38.091939 systemd[1]: Started sshd@21-147.75.203.55:22-139.178.89.65:54954.service - OpenSSH per-connection server daemon (139.178.89.65:54954). Jul 2 07:11:38.122230 sshd[2172]: Accepted publickey for core from 139.178.89.65 port 54954 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:38.125505 sshd[2172]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:38.136410 systemd-logind[1661]: New session 24 of user core. Jul 2 07:11:38.154181 systemd[1]: Started session-24.scope - Session 24 of User core. Jul 2 07:11:38.226309 sshd[2172]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:38.236088 systemd[1]: sshd@21-147.75.203.55:22-139.178.89.65:54954.service: Deactivated successfully. Jul 2 07:11:38.236454 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 07:11:38.236899 systemd-logind[1661]: Session 24 logged out. Waiting for processes to exit. Jul 2 07:11:38.237581 systemd[1]: Started sshd@22-147.75.203.55:22-139.178.89.65:54966.service - OpenSSH per-connection server daemon (139.178.89.65:54966). Jul 2 07:11:38.238149 systemd-logind[1661]: Removed session 24. Jul 2 07:11:38.268100 sshd[2178]: Accepted publickey for core from 139.178.89.65 port 54966 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:38.269220 sshd[2178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:38.273259 systemd-logind[1661]: New session 25 of user core. Jul 2 07:11:38.287986 systemd[1]: Started session-25.scope - Session 25 of User core. Jul 2 07:11:38.357577 sshd[2178]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:38.358947 systemd[1]: sshd@22-147.75.203.55:22-139.178.89.65:54966.service: Deactivated successfully. Jul 2 07:11:38.359326 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 07:11:38.359675 systemd-logind[1661]: Session 25 logged out. Waiting for processes to exit. Jul 2 07:11:38.360321 systemd-logind[1661]: Removed session 25. Jul 2 07:11:48.384931 systemd[1]: Started sshd@23-147.75.203.55:22-139.178.89.65:57162.service - OpenSSH per-connection server daemon (139.178.89.65:57162). Jul 2 07:11:48.414377 sshd[2184]: Accepted publickey for core from 139.178.89.65 port 57162 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:48.415427 sshd[2184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:48.419540 systemd-logind[1661]: New session 26 of user core. Jul 2 07:11:48.427904 systemd[1]: Started session-26.scope - Session 26 of User core. Jul 2 07:11:48.490487 sshd[2184]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:48.498061 systemd[1]: sshd@23-147.75.203.55:22-139.178.89.65:57162.service: Deactivated successfully. Jul 2 07:11:48.498415 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 07:11:48.498795 systemd-logind[1661]: Session 26 logged out. Waiting for processes to exit. Jul 2 07:11:48.499469 systemd[1]: Started sshd@24-147.75.203.55:22-139.178.89.65:57170.service - OpenSSH per-connection server daemon (139.178.89.65:57170). Jul 2 07:11:48.500000 systemd-logind[1661]: Removed session 26. Jul 2 07:11:48.528540 sshd[2190]: Accepted publickey for core from 139.178.89.65 port 57170 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:48.529361 sshd[2190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:48.532444 systemd-logind[1661]: New session 27 of user core. Jul 2 07:11:48.541857 systemd[1]: Started session-27.scope - Session 27 of User core. Jul 2 07:11:48.599732 sshd[2190]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:48.601152 systemd[1]: sshd@24-147.75.203.55:22-139.178.89.65:57170.service: Deactivated successfully. Jul 2 07:11:48.601562 systemd[1]: session-27.scope: Deactivated successfully. Jul 2 07:11:48.601960 systemd-logind[1661]: Session 27 logged out. Waiting for processes to exit. Jul 2 07:11:48.602538 systemd-logind[1661]: Removed session 27. Jul 2 07:11:58.623954 systemd[1]: Started sshd@25-147.75.203.55:22-139.178.89.65:46856.service - OpenSSH per-connection server daemon (139.178.89.65:46856). Jul 2 07:11:58.653055 sshd[2196]: Accepted publickey for core from 139.178.89.65 port 46856 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:58.654108 sshd[2196]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:58.657709 systemd-logind[1661]: New session 28 of user core. Jul 2 07:11:58.670896 systemd[1]: Started session-28.scope - Session 28 of User core. Jul 2 07:11:58.734366 sshd[2196]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:58.745111 systemd[1]: sshd@25-147.75.203.55:22-139.178.89.65:46856.service: Deactivated successfully. Jul 2 07:11:58.745484 systemd[1]: session-28.scope: Deactivated successfully. Jul 2 07:11:58.745973 systemd-logind[1661]: Session 28 logged out. Waiting for processes to exit. Jul 2 07:11:58.746642 systemd[1]: Started sshd@26-147.75.203.55:22-139.178.89.65:46858.service - OpenSSH per-connection server daemon (139.178.89.65:46858). Jul 2 07:11:58.747191 systemd-logind[1661]: Removed session 28. Jul 2 07:11:58.777068 sshd[2202]: Accepted publickey for core from 139.178.89.65 port 46858 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:11:58.778304 sshd[2202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:11:58.783151 systemd-logind[1661]: New session 29 of user core. Jul 2 07:11:58.798053 systemd[1]: Started session-29.scope - Session 29 of User core. Jul 2 07:11:58.869300 sshd[2202]: pam_unix(sshd:session): session closed for user core Jul 2 07:11:58.870525 systemd[1]: sshd@26-147.75.203.55:22-139.178.89.65:46858.service: Deactivated successfully. Jul 2 07:11:58.870965 systemd[1]: session-29.scope: Deactivated successfully. Jul 2 07:11:58.871384 systemd-logind[1661]: Session 29 logged out. Waiting for processes to exit. Jul 2 07:11:58.872036 systemd-logind[1661]: Removed session 29. Jul 2 07:12:08.884545 systemd[1]: Started sshd@27-147.75.203.55:22-139.178.89.65:57692.service - OpenSSH per-connection server daemon (139.178.89.65:57692). Jul 2 07:12:08.913016 sshd[2209]: Accepted publickey for core from 139.178.89.65 port 57692 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:08.913886 sshd[2209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:08.916984 systemd-logind[1661]: New session 30 of user core. Jul 2 07:12:08.927834 systemd[1]: Started session-30.scope - Session 30 of User core. Jul 2 07:12:08.986008 sshd[2209]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:08.997184 systemd[1]: sshd@27-147.75.203.55:22-139.178.89.65:57692.service: Deactivated successfully. Jul 2 07:12:08.997555 systemd[1]: session-30.scope: Deactivated successfully. Jul 2 07:12:08.997993 systemd-logind[1661]: Session 30 logged out. Waiting for processes to exit. Jul 2 07:12:08.998683 systemd[1]: Started sshd@28-147.75.203.55:22-139.178.89.65:57702.service - OpenSSH per-connection server daemon (139.178.89.65:57702). Jul 2 07:12:08.999329 systemd-logind[1661]: Removed session 30. Jul 2 07:12:09.028375 sshd[2216]: Accepted publickey for core from 139.178.89.65 port 57702 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:09.029198 sshd[2216]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:09.032493 systemd-logind[1661]: New session 31 of user core. Jul 2 07:12:09.040835 systemd[1]: Started session-31.scope - Session 31 of User core. Jul 2 07:12:09.098103 sshd[2216]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:09.099470 systemd[1]: sshd@28-147.75.203.55:22-139.178.89.65:57702.service: Deactivated successfully. Jul 2 07:12:09.099870 systemd[1]: session-31.scope: Deactivated successfully. Jul 2 07:12:09.100298 systemd-logind[1661]: Session 31 logged out. Waiting for processes to exit. Jul 2 07:12:09.100957 systemd-logind[1661]: Removed session 31. Jul 2 07:12:19.122957 systemd[1]: Started sshd@29-147.75.203.55:22-139.178.89.65:54184.service - OpenSSH per-connection server daemon (139.178.89.65:54184). Jul 2 07:12:19.152867 sshd[2226]: Accepted publickey for core from 139.178.89.65 port 54184 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:19.156456 sshd[2226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:19.168402 systemd-logind[1661]: New session 32 of user core. Jul 2 07:12:19.180083 systemd[1]: Started session-32.scope - Session 32 of User core. Jul 2 07:12:19.251407 sshd[2226]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:19.261134 systemd[1]: sshd@29-147.75.203.55:22-139.178.89.65:54184.service: Deactivated successfully. Jul 2 07:12:19.261491 systemd[1]: session-32.scope: Deactivated successfully. Jul 2 07:12:19.261855 systemd-logind[1661]: Session 32 logged out. Waiting for processes to exit. Jul 2 07:12:19.262529 systemd[1]: Started sshd@30-147.75.203.55:22-139.178.89.65:54200.service - OpenSSH per-connection server daemon (139.178.89.65:54200). Jul 2 07:12:19.263165 systemd-logind[1661]: Removed session 32. Jul 2 07:12:19.292031 sshd[2232]: Accepted publickey for core from 139.178.89.65 port 54200 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:19.293130 sshd[2232]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:19.297489 systemd-logind[1661]: New session 33 of user core. Jul 2 07:12:19.305947 systemd[1]: Started session-33.scope - Session 33 of User core. Jul 2 07:12:19.382733 sshd[2232]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:19.389155 systemd[1]: sshd@30-147.75.203.55:22-139.178.89.65:54200.service: Deactivated successfully. Jul 2 07:12:19.390948 systemd[1]: session-33.scope: Deactivated successfully. Jul 2 07:12:19.392698 systemd-logind[1661]: Session 33 logged out. Waiting for processes to exit. Jul 2 07:12:19.395134 systemd-logind[1661]: Removed session 33. Jul 2 07:12:29.407959 systemd[1]: Started sshd@31-147.75.203.55:22-139.178.89.65:54350.service - OpenSSH per-connection server daemon (139.178.89.65:54350). Jul 2 07:12:29.437374 sshd[2238]: Accepted publickey for core from 139.178.89.65 port 54350 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:29.438308 sshd[2238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:29.442046 systemd-logind[1661]: New session 34 of user core. Jul 2 07:12:29.462164 systemd[1]: Started session-34.scope - Session 34 of User core. Jul 2 07:12:29.534218 sshd[2238]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:29.543072 systemd[1]: sshd@31-147.75.203.55:22-139.178.89.65:54350.service: Deactivated successfully. Jul 2 07:12:29.543425 systemd[1]: session-34.scope: Deactivated successfully. Jul 2 07:12:29.543823 systemd-logind[1661]: Session 34 logged out. Waiting for processes to exit. Jul 2 07:12:29.544462 systemd[1]: Started sshd@32-147.75.203.55:22-139.178.89.65:54364.service - OpenSSH per-connection server daemon (139.178.89.65:54364). Jul 2 07:12:29.544986 systemd-logind[1661]: Removed session 34. Jul 2 07:12:29.573527 sshd[2244]: Accepted publickey for core from 139.178.89.65 port 54364 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:29.574353 sshd[2244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:29.577338 systemd-logind[1661]: New session 35 of user core. Jul 2 07:12:29.587889 systemd[1]: Started session-35.scope - Session 35 of User core. Jul 2 07:12:29.645138 sshd[2244]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:29.646515 systemd[1]: sshd@32-147.75.203.55:22-139.178.89.65:54364.service: Deactivated successfully. Jul 2 07:12:29.646941 systemd[1]: session-35.scope: Deactivated successfully. Jul 2 07:12:29.647331 systemd-logind[1661]: Session 35 logged out. Waiting for processes to exit. Jul 2 07:12:29.647981 systemd-logind[1661]: Removed session 35. Jul 2 07:12:39.676546 systemd[1]: Started sshd@33-147.75.203.55:22-139.178.89.65:57102.service - OpenSSH per-connection server daemon (139.178.89.65:57102). Jul 2 07:12:39.709107 sshd[2250]: Accepted publickey for core from 139.178.89.65 port 57102 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:39.709848 sshd[2250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:39.712865 systemd-logind[1661]: New session 36 of user core. Jul 2 07:12:39.724825 systemd[1]: Started session-36.scope - Session 36 of User core. Jul 2 07:12:39.781249 sshd[2250]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:39.799973 systemd[1]: sshd@33-147.75.203.55:22-139.178.89.65:57102.service: Deactivated successfully. Jul 2 07:12:39.801704 systemd[1]: session-36.scope: Deactivated successfully. Jul 2 07:12:39.803477 systemd-logind[1661]: Session 36 logged out. Waiting for processes to exit. Jul 2 07:12:39.819798 systemd[1]: Started sshd@34-147.75.203.55:22-139.178.89.65:57106.service - OpenSSH per-connection server daemon (139.178.89.65:57106). Jul 2 07:12:39.822402 systemd-logind[1661]: Removed session 36. Jul 2 07:12:39.873025 sshd[2256]: Accepted publickey for core from 139.178.89.65 port 57106 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:39.873636 sshd[2256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:39.875967 systemd-logind[1661]: New session 37 of user core. Jul 2 07:12:39.892922 systemd[1]: Started session-37.scope - Session 37 of User core. Jul 2 07:12:39.948414 sshd[2256]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:39.949737 systemd[1]: sshd@34-147.75.203.55:22-139.178.89.65:57106.service: Deactivated successfully. Jul 2 07:12:39.950121 systemd[1]: session-37.scope: Deactivated successfully. Jul 2 07:12:39.950510 systemd-logind[1661]: Session 37 logged out. Waiting for processes to exit. Jul 2 07:12:39.951158 systemd-logind[1661]: Removed session 37. Jul 2 07:12:49.963644 systemd[1]: Started sshd@35-147.75.203.55:22-139.178.89.65:43678.service - OpenSSH per-connection server daemon (139.178.89.65:43678). Jul 2 07:12:49.992373 sshd[2263]: Accepted publickey for core from 139.178.89.65 port 43678 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:49.993114 sshd[2263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:49.995945 systemd-logind[1661]: New session 38 of user core. Jul 2 07:12:50.005834 systemd[1]: Started session-38.scope - Session 38 of User core. Jul 2 07:12:50.061966 sshd[2263]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:50.071068 systemd[1]: sshd@35-147.75.203.55:22-139.178.89.65:43678.service: Deactivated successfully. Jul 2 07:12:50.071440 systemd[1]: session-38.scope: Deactivated successfully. Jul 2 07:12:50.071873 systemd-logind[1661]: Session 38 logged out. Waiting for processes to exit. Jul 2 07:12:50.072618 systemd[1]: Started sshd@36-147.75.203.55:22-139.178.89.65:43682.service - OpenSSH per-connection server daemon (139.178.89.65:43682). Jul 2 07:12:50.073189 systemd-logind[1661]: Removed session 38. Jul 2 07:12:50.102037 sshd[2269]: Accepted publickey for core from 139.178.89.65 port 43682 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:12:50.102871 sshd[2269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:12:50.105847 systemd-logind[1661]: New session 39 of user core. Jul 2 07:12:50.120058 systemd[1]: Started session-39.scope - Session 39 of User core. Jul 2 07:12:50.190323 sshd[2269]: pam_unix(sshd:session): session closed for user core Jul 2 07:12:50.196511 systemd[1]: sshd@36-147.75.203.55:22-139.178.89.65:43682.service: Deactivated successfully. Jul 2 07:12:50.198468 systemd[1]: session-39.scope: Deactivated successfully. Jul 2 07:12:50.200361 systemd-logind[1661]: Session 39 logged out. Waiting for processes to exit. Jul 2 07:12:50.202753 systemd-logind[1661]: Removed session 39. Jul 2 07:13:00.213135 systemd[1]: Started sshd@37-147.75.203.55:22-139.178.89.65:52860.service - OpenSSH per-connection server daemon (139.178.89.65:52860). Jul 2 07:13:00.242028 sshd[2275]: Accepted publickey for core from 139.178.89.65 port 52860 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:00.242779 sshd[2275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:00.245406 systemd-logind[1661]: New session 40 of user core. Jul 2 07:13:00.260014 systemd[1]: Started session-40.scope - Session 40 of User core. Jul 2 07:13:00.317427 sshd[2275]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:00.328058 systemd[1]: sshd@37-147.75.203.55:22-139.178.89.65:52860.service: Deactivated successfully. Jul 2 07:13:00.328424 systemd[1]: session-40.scope: Deactivated successfully. Jul 2 07:13:00.328854 systemd-logind[1661]: Session 40 logged out. Waiting for processes to exit. Jul 2 07:13:00.329507 systemd[1]: Started sshd@38-147.75.203.55:22-139.178.89.65:52874.service - OpenSSH per-connection server daemon (139.178.89.65:52874). Jul 2 07:13:00.330070 systemd-logind[1661]: Removed session 40. Jul 2 07:13:00.359679 sshd[2281]: Accepted publickey for core from 139.178.89.65 port 52874 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:00.360954 sshd[2281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:00.365002 systemd-logind[1661]: New session 41 of user core. Jul 2 07:13:00.385171 systemd[1]: Started session-41.scope - Session 41 of User core. Jul 2 07:13:00.469127 sshd[2281]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:00.475435 systemd[1]: sshd@38-147.75.203.55:22-139.178.89.65:52874.service: Deactivated successfully. Jul 2 07:13:00.477234 systemd[1]: session-41.scope: Deactivated successfully. Jul 2 07:13:00.479090 systemd-logind[1661]: Session 41 logged out. Waiting for processes to exit. Jul 2 07:13:00.481526 systemd-logind[1661]: Removed session 41. Jul 2 07:13:10.492961 systemd[1]: Started sshd@39-147.75.203.55:22-139.178.89.65:38634.service - OpenSSH per-connection server daemon (139.178.89.65:38634). Jul 2 07:13:10.521516 sshd[2287]: Accepted publickey for core from 139.178.89.65 port 38634 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:10.522449 sshd[2287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:10.526084 systemd-logind[1661]: New session 42 of user core. Jul 2 07:13:10.538903 systemd[1]: Started session-42.scope - Session 42 of User core. Jul 2 07:13:10.602415 sshd[2287]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:10.615114 systemd[1]: sshd@39-147.75.203.55:22-139.178.89.65:38634.service: Deactivated successfully. Jul 2 07:13:10.615462 systemd[1]: session-42.scope: Deactivated successfully. Jul 2 07:13:10.615936 systemd-logind[1661]: Session 42 logged out. Waiting for processes to exit. Jul 2 07:13:10.616616 systemd[1]: Started sshd@40-147.75.203.55:22-139.178.89.65:38644.service - OpenSSH per-connection server daemon (139.178.89.65:38644). Jul 2 07:13:10.617250 systemd-logind[1661]: Removed session 42. Jul 2 07:13:10.646084 sshd[2293]: Accepted publickey for core from 139.178.89.65 port 38644 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:10.646916 sshd[2293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:10.649942 systemd-logind[1661]: New session 43 of user core. Jul 2 07:13:10.675110 systemd[1]: Started session-43.scope - Session 43 of User core. Jul 2 07:13:10.741831 sshd[2293]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:10.743233 systemd[1]: sshd@40-147.75.203.55:22-139.178.89.65:38644.service: Deactivated successfully. Jul 2 07:13:10.743649 systemd[1]: session-43.scope: Deactivated successfully. Jul 2 07:13:10.744034 systemd-logind[1661]: Session 43 logged out. Waiting for processes to exit. Jul 2 07:13:10.744535 systemd-logind[1661]: Removed session 43. Jul 2 07:13:20.765940 systemd[1]: Started sshd@41-147.75.203.55:22-139.178.89.65:51934.service - OpenSSH per-connection server daemon (139.178.89.65:51934). Jul 2 07:13:20.794835 sshd[2299]: Accepted publickey for core from 139.178.89.65 port 51934 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:20.795784 sshd[2299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:20.799406 systemd-logind[1661]: New session 44 of user core. Jul 2 07:13:20.807854 systemd[1]: Started session-44.scope - Session 44 of User core. Jul 2 07:13:20.866179 sshd[2299]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:20.879146 systemd[1]: sshd@41-147.75.203.55:22-139.178.89.65:51934.service: Deactivated successfully. Jul 2 07:13:20.879518 systemd[1]: session-44.scope: Deactivated successfully. Jul 2 07:13:20.879925 systemd-logind[1661]: Session 44 logged out. Waiting for processes to exit. Jul 2 07:13:20.880646 systemd[1]: Started sshd@42-147.75.203.55:22-139.178.89.65:51936.service - OpenSSH per-connection server daemon (139.178.89.65:51936). Jul 2 07:13:20.881311 systemd-logind[1661]: Removed session 44. Jul 2 07:13:20.911794 sshd[2305]: Accepted publickey for core from 139.178.89.65 port 51936 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:20.913294 sshd[2305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:20.919077 systemd-logind[1661]: New session 45 of user core. Jul 2 07:13:20.932087 systemd[1]: Started session-45.scope - Session 45 of User core. Jul 2 07:13:21.015109 sshd[2305]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:21.021358 systemd[1]: sshd@42-147.75.203.55:22-139.178.89.65:51936.service: Deactivated successfully. Jul 2 07:13:21.023161 systemd[1]: session-45.scope: Deactivated successfully. Jul 2 07:13:21.024889 systemd-logind[1661]: Session 45 logged out. Waiting for processes to exit. Jul 2 07:13:21.027299 systemd-logind[1661]: Removed session 45. Jul 2 07:13:31.038958 systemd[1]: Started sshd@43-147.75.203.55:22-139.178.89.65:46442.service - OpenSSH per-connection server daemon (139.178.89.65:46442). Jul 2 07:13:31.067017 sshd[2311]: Accepted publickey for core from 139.178.89.65 port 46442 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:31.067872 sshd[2311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:31.070935 systemd-logind[1661]: New session 46 of user core. Jul 2 07:13:31.084768 systemd[1]: Started session-46.scope - Session 46 of User core. Jul 2 07:13:31.142366 sshd[2311]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:31.151059 systemd[1]: sshd@43-147.75.203.55:22-139.178.89.65:46442.service: Deactivated successfully. Jul 2 07:13:31.151407 systemd[1]: session-46.scope: Deactivated successfully. Jul 2 07:13:31.151778 systemd-logind[1661]: Session 46 logged out. Waiting for processes to exit. Jul 2 07:13:31.152447 systemd[1]: Started sshd@44-147.75.203.55:22-139.178.89.65:46458.service - OpenSSH per-connection server daemon (139.178.89.65:46458). Jul 2 07:13:31.153058 systemd-logind[1661]: Removed session 46. Jul 2 07:13:31.182725 sshd[2317]: Accepted publickey for core from 139.178.89.65 port 46458 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:31.183998 sshd[2317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:31.188553 systemd-logind[1661]: New session 47 of user core. Jul 2 07:13:31.200979 systemd[1]: Started session-47.scope - Session 47 of User core. Jul 2 07:13:31.281613 sshd[2317]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:31.287946 systemd[1]: sshd@44-147.75.203.55:22-139.178.89.65:46458.service: Deactivated successfully. Jul 2 07:13:31.289723 systemd[1]: session-47.scope: Deactivated successfully. Jul 2 07:13:31.291535 systemd-logind[1661]: Session 47 logged out. Waiting for processes to exit. Jul 2 07:13:31.293869 systemd-logind[1661]: Removed session 47. Jul 2 07:13:41.311942 systemd[1]: Started sshd@45-147.75.203.55:22-139.178.89.65:40370.service - OpenSSH per-connection server daemon (139.178.89.65:40370). Jul 2 07:13:41.340972 sshd[2323]: Accepted publickey for core from 139.178.89.65 port 40370 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:41.341791 sshd[2323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:41.344830 systemd-logind[1661]: New session 48 of user core. Jul 2 07:13:41.350864 systemd[1]: Started session-48.scope - Session 48 of User core. Jul 2 07:13:41.407506 sshd[2323]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:41.421154 systemd[1]: sshd@45-147.75.203.55:22-139.178.89.65:40370.service: Deactivated successfully. Jul 2 07:13:41.421533 systemd[1]: session-48.scope: Deactivated successfully. Jul 2 07:13:41.421957 systemd-logind[1661]: Session 48 logged out. Waiting for processes to exit. Jul 2 07:13:41.422655 systemd[1]: Started sshd@46-147.75.203.55:22-139.178.89.65:40376.service - OpenSSH per-connection server daemon (139.178.89.65:40376). Jul 2 07:13:41.423338 systemd-logind[1661]: Removed session 48. Jul 2 07:13:41.455876 sshd[2329]: Accepted publickey for core from 139.178.89.65 port 40376 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:41.457294 sshd[2329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:41.463522 systemd-logind[1661]: New session 49 of user core. Jul 2 07:13:41.476065 systemd[1]: Started session-49.scope - Session 49 of User core. Jul 2 07:13:41.548159 sshd[2329]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:41.549527 systemd[1]: sshd@46-147.75.203.55:22-139.178.89.65:40376.service: Deactivated successfully. Jul 2 07:13:41.549958 systemd[1]: session-49.scope: Deactivated successfully. Jul 2 07:13:41.550307 systemd-logind[1661]: Session 49 logged out. Waiting for processes to exit. Jul 2 07:13:41.550987 systemd-logind[1661]: Removed session 49. Jul 2 07:13:51.577139 systemd[1]: Started sshd@47-147.75.203.55:22-139.178.89.65:43690.service - OpenSSH per-connection server daemon (139.178.89.65:43690). Jul 2 07:13:51.606024 sshd[2335]: Accepted publickey for core from 139.178.89.65 port 43690 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:51.606813 sshd[2335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:51.610008 systemd-logind[1661]: New session 50 of user core. Jul 2 07:13:51.629936 systemd[1]: Started session-50.scope - Session 50 of User core. Jul 2 07:13:51.690216 sshd[2335]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:51.698911 systemd[1]: sshd@47-147.75.203.55:22-139.178.89.65:43690.service: Deactivated successfully. Jul 2 07:13:51.699271 systemd[1]: session-50.scope: Deactivated successfully. Jul 2 07:13:51.699564 systemd-logind[1661]: Session 50 logged out. Waiting for processes to exit. Jul 2 07:13:51.700291 systemd[1]: Started sshd@48-147.75.203.55:22-139.178.89.65:43696.service - OpenSSH per-connection server daemon (139.178.89.65:43696). Jul 2 07:13:51.700805 systemd-logind[1661]: Removed session 50. Jul 2 07:13:51.731558 sshd[2341]: Accepted publickey for core from 139.178.89.65 port 43696 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:13:51.734828 sshd[2341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:13:51.745526 systemd-logind[1661]: New session 51 of user core. Jul 2 07:13:51.756059 systemd[1]: Started session-51.scope - Session 51 of User core. Jul 2 07:13:51.829166 sshd[2341]: pam_unix(sshd:session): session closed for user core Jul 2 07:13:51.830535 systemd[1]: sshd@48-147.75.203.55:22-139.178.89.65:43696.service: Deactivated successfully. Jul 2 07:13:51.830925 systemd[1]: session-51.scope: Deactivated successfully. Jul 2 07:13:51.831268 systemd-logind[1661]: Session 51 logged out. Waiting for processes to exit. Jul 2 07:13:51.831784 systemd-logind[1661]: Removed session 51. Jul 2 07:14:01.844628 systemd[1]: Started sshd@49-147.75.203.55:22-139.178.89.65:40172.service - OpenSSH per-connection server daemon (139.178.89.65:40172). Jul 2 07:14:01.873464 sshd[2348]: Accepted publickey for core from 139.178.89.65 port 40172 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:01.874356 sshd[2348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:01.877664 systemd-logind[1661]: New session 52 of user core. Jul 2 07:14:01.887859 systemd[1]: Started session-52.scope - Session 52 of User core. Jul 2 07:14:01.946341 sshd[2348]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:01.961145 systemd[1]: sshd@49-147.75.203.55:22-139.178.89.65:40172.service: Deactivated successfully. Jul 2 07:14:01.961529 systemd[1]: session-52.scope: Deactivated successfully. Jul 2 07:14:01.961925 systemd-logind[1661]: Session 52 logged out. Waiting for processes to exit. Jul 2 07:14:01.962651 systemd[1]: Started sshd@50-147.75.203.55:22-139.178.89.65:40180.service - OpenSSH per-connection server daemon (139.178.89.65:40180). Jul 2 07:14:01.963300 systemd-logind[1661]: Removed session 52. Jul 2 07:14:01.993677 sshd[2354]: Accepted publickey for core from 139.178.89.65 port 40180 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:01.994997 sshd[2354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:02.000267 systemd-logind[1661]: New session 53 of user core. Jul 2 07:14:02.019167 systemd[1]: Started session-53.scope - Session 53 of User core. Jul 2 07:14:02.091325 sshd[2354]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:02.092592 systemd[1]: sshd@50-147.75.203.55:22-139.178.89.65:40180.service: Deactivated successfully. Jul 2 07:14:02.092981 systemd[1]: session-53.scope: Deactivated successfully. Jul 2 07:14:02.093335 systemd-logind[1661]: Session 53 logged out. Waiting for processes to exit. Jul 2 07:14:02.093987 systemd-logind[1661]: Removed session 53. Jul 2 07:14:12.107963 systemd[1]: Started sshd@51-147.75.203.55:22-139.178.89.65:47624.service - OpenSSH per-connection server daemon (139.178.89.65:47624). Jul 2 07:14:12.136364 sshd[2360]: Accepted publickey for core from 139.178.89.65 port 47624 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:12.137155 sshd[2360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:12.140296 systemd-logind[1661]: New session 54 of user core. Jul 2 07:14:12.148806 systemd[1]: Started session-54.scope - Session 54 of User core. Jul 2 07:14:12.205144 sshd[2360]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:12.216119 systemd[1]: sshd@51-147.75.203.55:22-139.178.89.65:47624.service: Deactivated successfully. Jul 2 07:14:12.216471 systemd[1]: session-54.scope: Deactivated successfully. Jul 2 07:14:12.216849 systemd-logind[1661]: Session 54 logged out. Waiting for processes to exit. Jul 2 07:14:12.217454 systemd[1]: Started sshd@52-147.75.203.55:22-139.178.89.65:47630.service - OpenSSH per-connection server daemon (139.178.89.65:47630). Jul 2 07:14:12.217911 systemd-logind[1661]: Removed session 54. Jul 2 07:14:12.247492 sshd[2366]: Accepted publickey for core from 139.178.89.65 port 47630 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:12.248629 sshd[2366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:12.253105 systemd-logind[1661]: New session 55 of user core. Jul 2 07:14:12.268176 systemd[1]: Started session-55.scope - Session 55 of User core. Jul 2 07:14:12.339220 sshd[2366]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:12.340551 systemd[1]: sshd@52-147.75.203.55:22-139.178.89.65:47630.service: Deactivated successfully. Jul 2 07:14:12.340970 systemd[1]: session-55.scope: Deactivated successfully. Jul 2 07:14:12.341357 systemd-logind[1661]: Session 55 logged out. Waiting for processes to exit. Jul 2 07:14:12.342017 systemd-logind[1661]: Removed session 55. Jul 2 07:14:22.366987 systemd[1]: Started sshd@53-147.75.203.55:22-139.178.89.65:44656.service - OpenSSH per-connection server daemon (139.178.89.65:44656). Jul 2 07:14:22.396021 sshd[2372]: Accepted publickey for core from 139.178.89.65 port 44656 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:22.396769 sshd[2372]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:22.399788 systemd-logind[1661]: New session 56 of user core. Jul 2 07:14:22.408830 systemd[1]: Started session-56.scope - Session 56 of User core. Jul 2 07:14:22.464680 sshd[2372]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:22.478188 systemd[1]: sshd@53-147.75.203.55:22-139.178.89.65:44656.service: Deactivated successfully. Jul 2 07:14:22.478563 systemd[1]: session-56.scope: Deactivated successfully. Jul 2 07:14:22.479010 systemd-logind[1661]: Session 56 logged out. Waiting for processes to exit. Jul 2 07:14:22.479696 systemd[1]: Started sshd@54-147.75.203.55:22-139.178.89.65:44658.service - OpenSSH per-connection server daemon (139.178.89.65:44658). Jul 2 07:14:22.480421 systemd-logind[1661]: Removed session 56. Jul 2 07:14:22.509181 sshd[2378]: Accepted publickey for core from 139.178.89.65 port 44658 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:22.509975 sshd[2378]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:22.513175 systemd-logind[1661]: New session 57 of user core. Jul 2 07:14:22.525841 systemd[1]: Started session-57.scope - Session 57 of User core. Jul 2 07:14:22.593262 sshd[2378]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:22.599518 systemd[1]: sshd@54-147.75.203.55:22-139.178.89.65:44658.service: Deactivated successfully. Jul 2 07:14:22.601314 systemd[1]: session-57.scope: Deactivated successfully. Jul 2 07:14:22.603065 systemd-logind[1661]: Session 57 logged out. Waiting for processes to exit. Jul 2 07:14:22.605500 systemd-logind[1661]: Removed session 57. Jul 2 07:14:32.621607 systemd[1]: Started sshd@55-147.75.203.55:22-139.178.89.65:59318.service - OpenSSH per-connection server daemon (139.178.89.65:59318). Jul 2 07:14:32.653926 sshd[2384]: Accepted publickey for core from 139.178.89.65 port 59318 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:32.654659 sshd[2384]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:32.657604 systemd-logind[1661]: New session 58 of user core. Jul 2 07:14:32.667841 systemd[1]: Started session-58.scope - Session 58 of User core. Jul 2 07:14:32.730042 sshd[2384]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:32.742233 systemd[1]: sshd@55-147.75.203.55:22-139.178.89.65:59318.service: Deactivated successfully. Jul 2 07:14:32.742626 systemd[1]: session-58.scope: Deactivated successfully. Jul 2 07:14:32.743073 systemd-logind[1661]: Session 58 logged out. Waiting for processes to exit. Jul 2 07:14:32.743793 systemd[1]: Started sshd@56-147.75.203.55:22-139.178.89.65:59326.service - OpenSSH per-connection server daemon (139.178.89.65:59326). Jul 2 07:14:32.744388 systemd-logind[1661]: Removed session 58. Jul 2 07:14:32.775535 sshd[2390]: Accepted publickey for core from 139.178.89.65 port 59326 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:32.777178 sshd[2390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:32.783642 systemd-logind[1661]: New session 59 of user core. Jul 2 07:14:32.796108 systemd[1]: Started session-59.scope - Session 59 of User core. Jul 2 07:14:32.868242 sshd[2390]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:32.869568 systemd[1]: sshd@56-147.75.203.55:22-139.178.89.65:59326.service: Deactivated successfully. Jul 2 07:14:32.869998 systemd[1]: session-59.scope: Deactivated successfully. Jul 2 07:14:32.870376 systemd-logind[1661]: Session 59 logged out. Waiting for processes to exit. Jul 2 07:14:32.870990 systemd-logind[1661]: Removed session 59. Jul 2 07:14:42.885099 systemd[1]: Started sshd@57-147.75.203.55:22-139.178.89.65:53934.service - OpenSSH per-connection server daemon (139.178.89.65:53934). Jul 2 07:14:42.913406 sshd[2396]: Accepted publickey for core from 139.178.89.65 port 53934 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:42.914202 sshd[2396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:42.917376 systemd-logind[1661]: New session 60 of user core. Jul 2 07:14:42.925835 systemd[1]: Started session-60.scope - Session 60 of User core. Jul 2 07:14:42.982534 sshd[2396]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:42.991026 systemd[1]: sshd@57-147.75.203.55:22-139.178.89.65:53934.service: Deactivated successfully. Jul 2 07:14:42.991355 systemd[1]: session-60.scope: Deactivated successfully. Jul 2 07:14:42.991761 systemd-logind[1661]: Session 60 logged out. Waiting for processes to exit. Jul 2 07:14:42.992428 systemd[1]: Started sshd@58-147.75.203.55:22-139.178.89.65:53938.service - OpenSSH per-connection server daemon (139.178.89.65:53938). Jul 2 07:14:42.992959 systemd-logind[1661]: Removed session 60. Jul 2 07:14:43.021545 sshd[2402]: Accepted publickey for core from 139.178.89.65 port 53938 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:43.022392 sshd[2402]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:43.025297 systemd-logind[1661]: New session 61 of user core. Jul 2 07:14:43.035902 systemd[1]: Started session-61.scope - Session 61 of User core. Jul 2 07:14:43.093129 sshd[2402]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:43.094450 systemd[1]: sshd@58-147.75.203.55:22-139.178.89.65:53938.service: Deactivated successfully. Jul 2 07:14:43.094873 systemd[1]: session-61.scope: Deactivated successfully. Jul 2 07:14:43.095247 systemd-logind[1661]: Session 61 logged out. Waiting for processes to exit. Jul 2 07:14:43.095822 systemd-logind[1661]: Removed session 61. Jul 2 07:14:53.115943 systemd[1]: Started sshd@59-147.75.203.55:22-139.178.89.65:39000.service - OpenSSH per-connection server daemon (139.178.89.65:39000). Jul 2 07:14:53.145084 sshd[2409]: Accepted publickey for core from 139.178.89.65 port 39000 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:53.146136 sshd[2409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:53.149908 systemd-logind[1661]: New session 62 of user core. Jul 2 07:14:53.165147 systemd[1]: Started session-62.scope - Session 62 of User core. Jul 2 07:14:53.234418 sshd[2409]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:53.258366 systemd[1]: sshd@59-147.75.203.55:22-139.178.89.65:39000.service: Deactivated successfully. Jul 2 07:14:53.258803 systemd[1]: session-62.scope: Deactivated successfully. Jul 2 07:14:53.259251 systemd-logind[1661]: Session 62 logged out. Waiting for processes to exit. Jul 2 07:14:53.260076 systemd[1]: Started sshd@60-147.75.203.55:22-139.178.89.65:39016.service - OpenSSH per-connection server daemon (139.178.89.65:39016). Jul 2 07:14:53.260729 systemd-logind[1661]: Removed session 62. Jul 2 07:14:53.289909 sshd[2415]: Accepted publickey for core from 139.178.89.65 port 39016 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:14:53.290749 sshd[2415]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:14:53.293666 systemd-logind[1661]: New session 63 of user core. Jul 2 07:14:53.311069 systemd[1]: Started session-63.scope - Session 63 of User core. Jul 2 07:14:53.383055 sshd[2415]: pam_unix(sshd:session): session closed for user core Jul 2 07:14:53.389218 systemd[1]: sshd@60-147.75.203.55:22-139.178.89.65:39016.service: Deactivated successfully. Jul 2 07:14:53.390973 systemd[1]: session-63.scope: Deactivated successfully. Jul 2 07:14:53.392726 systemd-logind[1661]: Session 63 logged out. Waiting for processes to exit. Jul 2 07:14:53.395172 systemd-logind[1661]: Removed session 63. Jul 2 07:15:03.407964 systemd[1]: Started sshd@61-147.75.203.55:22-139.178.89.65:41592.service - OpenSSH per-connection server daemon (139.178.89.65:41592). Jul 2 07:15:03.437038 sshd[2422]: Accepted publickey for core from 139.178.89.65 port 41592 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:03.437985 sshd[2422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:03.441700 systemd-logind[1661]: New session 64 of user core. Jul 2 07:15:03.459102 systemd[1]: Started session-64.scope - Session 64 of User core. Jul 2 07:15:03.530746 sshd[2422]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:03.554546 systemd[1]: sshd@61-147.75.203.55:22-139.178.89.65:41592.service: Deactivated successfully. Jul 2 07:15:03.555004 systemd[1]: session-64.scope: Deactivated successfully. Jul 2 07:15:03.555491 systemd-logind[1661]: Session 64 logged out. Waiting for processes to exit. Jul 2 07:15:03.556367 systemd[1]: Started sshd@62-147.75.203.55:22-139.178.89.65:41608.service - OpenSSH per-connection server daemon (139.178.89.65:41608). Jul 2 07:15:03.557022 systemd-logind[1661]: Removed session 64. Jul 2 07:15:03.589839 sshd[2430]: Accepted publickey for core from 139.178.89.65 port 41608 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:03.591700 sshd[2430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:03.599327 systemd-logind[1661]: New session 65 of user core. Jul 2 07:15:03.611149 systemd[1]: Started session-65.scope - Session 65 of User core. Jul 2 07:15:03.683768 sshd[2430]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:03.685199 systemd[1]: sshd@62-147.75.203.55:22-139.178.89.65:41608.service: Deactivated successfully. Jul 2 07:15:03.685612 systemd[1]: session-65.scope: Deactivated successfully. Jul 2 07:15:03.686032 systemd-logind[1661]: Session 65 logged out. Waiting for processes to exit. Jul 2 07:15:03.686557 systemd-logind[1661]: Removed session 65. Jul 2 07:15:09.777221 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:15:09.776Z","caller":"v2discovery/discovery.go:361","msg":"error while waiting for peers","discovery-url":"https://discovery.etcd.io","error":"client: etcd cluster is unavailable or misconfigured; error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n","err-detail":"error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n"} Jul 2 07:15:09.777221 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:15:09.776Z","caller":"v2discovery/discovery.go:297","msg":"retry connecting to discovery service","url":"https://discovery.etcd.io","reason":"waiting for other nodes","backoff":"2s"} Jul 2 07:15:11.871130 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:15:11.870Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"31d2d136df99400d"} Jul 2 07:15:11.871130 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:15:11.870Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"49c0c2e9597dd6c7"} Jul 2 07:15:11.871130 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:15:11.870Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Jul 2 07:15:13.718941 systemd[1]: Started sshd@63-147.75.203.55:22-139.178.89.65:49014.service - OpenSSH per-connection server daemon (139.178.89.65:49014). Jul 2 07:15:13.748019 sshd[2438]: Accepted publickey for core from 139.178.89.65 port 49014 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:13.748774 sshd[2438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:13.751863 systemd-logind[1661]: New session 66 of user core. Jul 2 07:15:13.770071 systemd[1]: Started session-66.scope - Session 66 of User core. Jul 2 07:15:13.828476 sshd[2438]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:13.844072 systemd[1]: sshd@63-147.75.203.55:22-139.178.89.65:49014.service: Deactivated successfully. Jul 2 07:15:13.844476 systemd[1]: session-66.scope: Deactivated successfully. Jul 2 07:15:13.844954 systemd-logind[1661]: Session 66 logged out. Waiting for processes to exit. Jul 2 07:15:13.845646 systemd[1]: Started sshd@64-147.75.203.55:22-139.178.89.65:49024.service - OpenSSH per-connection server daemon (139.178.89.65:49024). Jul 2 07:15:13.846320 systemd-logind[1661]: Removed session 66. Jul 2 07:15:13.874573 sshd[2444]: Accepted publickey for core from 139.178.89.65 port 49024 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:13.875446 sshd[2444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:13.879012 systemd-logind[1661]: New session 67 of user core. Jul 2 07:15:13.890850 systemd[1]: Started session-67.scope - Session 67 of User core. Jul 2 07:15:13.949365 sshd[2444]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:13.950598 systemd[1]: sshd@64-147.75.203.55:22-139.178.89.65:49024.service: Deactivated successfully. Jul 2 07:15:13.951024 systemd[1]: session-67.scope: Deactivated successfully. Jul 2 07:15:13.951429 systemd-logind[1661]: Session 67 logged out. Waiting for processes to exit. Jul 2 07:15:13.952132 systemd-logind[1661]: Removed session 67. Jul 2 07:15:23.982011 systemd[1]: Started sshd@65-147.75.203.55:22-139.178.89.65:52650.service - OpenSSH per-connection server daemon (139.178.89.65:52650). Jul 2 07:15:24.011066 sshd[2451]: Accepted publickey for core from 139.178.89.65 port 52650 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:24.011861 sshd[2451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:24.014990 systemd-logind[1661]: New session 68 of user core. Jul 2 07:15:24.036944 systemd[1]: Started session-68.scope - Session 68 of User core. Jul 2 07:15:24.097268 sshd[2451]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:24.112191 systemd[1]: sshd@65-147.75.203.55:22-139.178.89.65:52650.service: Deactivated successfully. Jul 2 07:15:24.112564 systemd[1]: session-68.scope: Deactivated successfully. Jul 2 07:15:24.112960 systemd-logind[1661]: Session 68 logged out. Waiting for processes to exit. Jul 2 07:15:24.113685 systemd[1]: Started sshd@66-147.75.203.55:22-139.178.89.65:52652.service - OpenSSH per-connection server daemon (139.178.89.65:52652). Jul 2 07:15:24.114241 systemd-logind[1661]: Removed session 68. Jul 2 07:15:24.144461 sshd[2457]: Accepted publickey for core from 139.178.89.65 port 52652 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:24.145794 sshd[2457]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:24.150761 systemd-logind[1661]: New session 69 of user core. Jul 2 07:15:24.162041 systemd[1]: Started session-69.scope - Session 69 of User core. Jul 2 07:15:24.233331 sshd[2457]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:24.234660 systemd[1]: sshd@66-147.75.203.55:22-139.178.89.65:52652.service: Deactivated successfully. Jul 2 07:15:24.235061 systemd[1]: session-69.scope: Deactivated successfully. Jul 2 07:15:24.235455 systemd-logind[1661]: Session 69 logged out. Waiting for processes to exit. Jul 2 07:15:24.236120 systemd-logind[1661]: Removed session 69. Jul 2 07:15:34.261942 systemd[1]: Started sshd@67-147.75.203.55:22-139.178.89.65:38474.service - OpenSSH per-connection server daemon (139.178.89.65:38474). Jul 2 07:15:34.291024 sshd[2463]: Accepted publickey for core from 139.178.89.65 port 38474 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:34.291815 sshd[2463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:34.294847 systemd-logind[1661]: New session 70 of user core. Jul 2 07:15:34.311934 systemd[1]: Started session-70.scope - Session 70 of User core. Jul 2 07:15:34.370175 sshd[2463]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:34.382177 systemd[1]: sshd@67-147.75.203.55:22-139.178.89.65:38474.service: Deactivated successfully. Jul 2 07:15:34.382546 systemd[1]: session-70.scope: Deactivated successfully. Jul 2 07:15:34.382987 systemd-logind[1661]: Session 70 logged out. Waiting for processes to exit. Jul 2 07:15:34.383680 systemd[1]: Started sshd@68-147.75.203.55:22-139.178.89.65:38480.service - OpenSSH per-connection server daemon (139.178.89.65:38480). Jul 2 07:15:34.384021 systemd-logind[1661]: Removed session 70. Jul 2 07:15:34.413054 sshd[2469]: Accepted publickey for core from 139.178.89.65 port 38480 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:34.413865 sshd[2469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:34.417026 systemd-logind[1661]: New session 71 of user core. Jul 2 07:15:34.426874 systemd[1]: Started session-71.scope - Session 71 of User core. Jul 2 07:15:34.484466 sshd[2469]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:34.485835 systemd[1]: sshd@68-147.75.203.55:22-139.178.89.65:38480.service: Deactivated successfully. Jul 2 07:15:34.486232 systemd[1]: session-71.scope: Deactivated successfully. Jul 2 07:15:34.486506 systemd-logind[1661]: Session 71 logged out. Waiting for processes to exit. Jul 2 07:15:34.487135 systemd-logind[1661]: Removed session 71. Jul 2 07:15:44.507971 systemd[1]: Started sshd@69-147.75.203.55:22-139.178.89.65:40200.service - OpenSSH per-connection server daemon (139.178.89.65:40200). Jul 2 07:15:44.536635 sshd[2477]: Accepted publickey for core from 139.178.89.65 port 40200 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:44.537565 sshd[2477]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:44.541221 systemd-logind[1661]: New session 72 of user core. Jul 2 07:15:44.550863 systemd[1]: Started session-72.scope - Session 72 of User core. Jul 2 07:15:44.612147 sshd[2477]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:44.624080 systemd[1]: sshd@69-147.75.203.55:22-139.178.89.65:40200.service: Deactivated successfully. Jul 2 07:15:44.624432 systemd[1]: session-72.scope: Deactivated successfully. Jul 2 07:15:44.624798 systemd-logind[1661]: Session 72 logged out. Waiting for processes to exit. Jul 2 07:15:44.625514 systemd[1]: Started sshd@70-147.75.203.55:22-139.178.89.65:40210.service - OpenSSH per-connection server daemon (139.178.89.65:40210). Jul 2 07:15:44.626171 systemd-logind[1661]: Removed session 72. Jul 2 07:15:44.654817 sshd[2483]: Accepted publickey for core from 139.178.89.65 port 40210 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:44.655637 sshd[2483]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:44.658664 systemd-logind[1661]: New session 73 of user core. Jul 2 07:15:44.668852 systemd[1]: Started session-73.scope - Session 73 of User core. Jul 2 07:15:44.737246 sshd[2483]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:44.743474 systemd[1]: sshd@70-147.75.203.55:22-139.178.89.65:40210.service: Deactivated successfully. Jul 2 07:15:44.745252 systemd[1]: session-73.scope: Deactivated successfully. Jul 2 07:15:44.747028 systemd-logind[1661]: Session 73 logged out. Waiting for processes to exit. Jul 2 07:15:44.749446 systemd-logind[1661]: Removed session 73. Jul 2 07:15:54.752948 systemd[1]: Started sshd@71-147.75.203.55:22-139.178.89.65:44120.service - OpenSSH per-connection server daemon (139.178.89.65:44120). Jul 2 07:15:54.781554 sshd[2489]: Accepted publickey for core from 139.178.89.65 port 44120 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:54.782280 sshd[2489]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:54.785281 systemd-logind[1661]: New session 74 of user core. Jul 2 07:15:54.796816 systemd[1]: Started session-74.scope - Session 74 of User core. Jul 2 07:15:54.853167 sshd[2489]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:54.862107 systemd[1]: sshd@71-147.75.203.55:22-139.178.89.65:44120.service: Deactivated successfully. Jul 2 07:15:54.862470 systemd[1]: session-74.scope: Deactivated successfully. Jul 2 07:15:54.862835 systemd-logind[1661]: Session 74 logged out. Waiting for processes to exit. Jul 2 07:15:54.863505 systemd[1]: Started sshd@72-147.75.203.55:22-139.178.89.65:44128.service - OpenSSH per-connection server daemon (139.178.89.65:44128). Jul 2 07:15:54.864020 systemd-logind[1661]: Removed session 74. Jul 2 07:15:54.892381 sshd[2495]: Accepted publickey for core from 139.178.89.65 port 44128 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:15:54.893206 sshd[2495]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:15:54.896336 systemd-logind[1661]: New session 75 of user core. Jul 2 07:15:54.910216 systemd[1]: Started session-75.scope - Session 75 of User core. Jul 2 07:15:54.993200 sshd[2495]: pam_unix(sshd:session): session closed for user core Jul 2 07:15:54.999376 systemd[1]: sshd@72-147.75.203.55:22-139.178.89.65:44128.service: Deactivated successfully. Jul 2 07:15:55.001154 systemd[1]: session-75.scope: Deactivated successfully. Jul 2 07:15:55.002813 systemd-logind[1661]: Session 75 logged out. Waiting for processes to exit. Jul 2 07:15:55.005215 systemd-logind[1661]: Removed session 75. Jul 2 07:16:05.009926 systemd[1]: Started sshd@73-147.75.203.55:22-139.178.89.65:38894.service - OpenSSH per-connection server daemon (139.178.89.65:38894). Jul 2 07:16:05.037960 sshd[2503]: Accepted publickey for core from 139.178.89.65 port 38894 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:05.038764 sshd[2503]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:05.042009 systemd-logind[1661]: New session 76 of user core. Jul 2 07:16:05.060075 systemd[1]: Started session-76.scope - Session 76 of User core. Jul 2 07:16:05.120412 sshd[2503]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:05.131127 systemd[1]: sshd@73-147.75.203.55:22-139.178.89.65:38894.service: Deactivated successfully. Jul 2 07:16:05.131505 systemd[1]: session-76.scope: Deactivated successfully. Jul 2 07:16:05.131971 systemd-logind[1661]: Session 76 logged out. Waiting for processes to exit. Jul 2 07:16:05.132655 systemd[1]: Started sshd@74-147.75.203.55:22-139.178.89.65:38906.service - OpenSSH per-connection server daemon (139.178.89.65:38906). Jul 2 07:16:05.133290 systemd-logind[1661]: Removed session 76. Jul 2 07:16:05.162892 sshd[2509]: Accepted publickey for core from 139.178.89.65 port 38906 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:05.166112 sshd[2509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:05.176994 systemd-logind[1661]: New session 77 of user core. Jul 2 07:16:05.188070 systemd[1]: Started session-77.scope - Session 77 of User core. Jul 2 07:16:05.270232 sshd[2509]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:05.276424 systemd[1]: sshd@74-147.75.203.55:22-139.178.89.65:38906.service: Deactivated successfully. Jul 2 07:16:05.278195 systemd[1]: session-77.scope: Deactivated successfully. Jul 2 07:16:05.279892 systemd-logind[1661]: Session 77 logged out. Waiting for processes to exit. Jul 2 07:16:05.282317 systemd-logind[1661]: Removed session 77. Jul 2 07:16:15.303946 systemd[1]: Started sshd@75-147.75.203.55:22-139.178.89.65:41972.service - OpenSSH per-connection server daemon (139.178.89.65:41972). Jul 2 07:16:15.333655 sshd[2515]: Accepted publickey for core from 139.178.89.65 port 41972 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:15.334714 sshd[2515]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:15.338945 systemd-logind[1661]: New session 78 of user core. Jul 2 07:16:15.357122 systemd[1]: Started session-78.scope - Session 78 of User core. Jul 2 07:16:15.430075 sshd[2515]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:15.442047 systemd[1]: sshd@75-147.75.203.55:22-139.178.89.65:41972.service: Deactivated successfully. Jul 2 07:16:15.442430 systemd[1]: session-78.scope: Deactivated successfully. Jul 2 07:16:15.442862 systemd-logind[1661]: Session 78 logged out. Waiting for processes to exit. Jul 2 07:16:15.443539 systemd[1]: Started sshd@76-147.75.203.55:22-139.178.89.65:41986.service - OpenSSH per-connection server daemon (139.178.89.65:41986). Jul 2 07:16:15.444094 systemd-logind[1661]: Removed session 78. Jul 2 07:16:15.474686 sshd[2521]: Accepted publickey for core from 139.178.89.65 port 41986 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:15.475978 sshd[2521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:15.481176 systemd-logind[1661]: New session 79 of user core. Jul 2 07:16:15.493047 systemd[1]: Started session-79.scope - Session 79 of User core. Jul 2 07:16:15.565578 sshd[2521]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:15.566950 systemd[1]: sshd@76-147.75.203.55:22-139.178.89.65:41986.service: Deactivated successfully. Jul 2 07:16:15.567359 systemd[1]: session-79.scope: Deactivated successfully. Jul 2 07:16:15.567754 systemd-logind[1661]: Session 79 logged out. Waiting for processes to exit. Jul 2 07:16:15.568359 systemd-logind[1661]: Removed session 79. Jul 2 07:16:25.598146 systemd[1]: Started sshd@77-147.75.203.55:22-139.178.89.65:50134.service - OpenSSH per-connection server daemon (139.178.89.65:50134). Jul 2 07:16:25.628025 sshd[2529]: Accepted publickey for core from 139.178.89.65 port 50134 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:25.631274 sshd[2529]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:25.642320 systemd-logind[1661]: New session 80 of user core. Jul 2 07:16:25.654080 systemd[1]: Started session-80.scope - Session 80 of User core. Jul 2 07:16:25.726026 sshd[2529]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:25.742930 systemd[1]: sshd@77-147.75.203.55:22-139.178.89.65:50134.service: Deactivated successfully. Jul 2 07:16:25.744963 systemd[1]: session-80.scope: Deactivated successfully. Jul 2 07:16:25.746765 systemd-logind[1661]: Session 80 logged out. Waiting for processes to exit. Jul 2 07:16:25.765041 systemd[1]: Started sshd@78-147.75.203.55:22-139.178.89.65:50148.service - OpenSSH per-connection server daemon (139.178.89.65:50148). Jul 2 07:16:25.767574 systemd-logind[1661]: Removed session 80. Jul 2 07:16:25.797025 sshd[2535]: Accepted publickey for core from 139.178.89.65 port 50148 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:25.797794 sshd[2535]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:25.800929 systemd-logind[1661]: New session 81 of user core. Jul 2 07:16:25.810819 systemd[1]: Started session-81.scope - Session 81 of User core. Jul 2 07:16:25.867169 sshd[2535]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:25.868519 systemd[1]: sshd@78-147.75.203.55:22-139.178.89.65:50148.service: Deactivated successfully. Jul 2 07:16:25.868944 systemd[1]: session-81.scope: Deactivated successfully. Jul 2 07:16:25.869316 systemd-logind[1661]: Session 81 logged out. Waiting for processes to exit. Jul 2 07:16:25.870007 systemd-logind[1661]: Removed session 81. Jul 2 07:16:35.890939 systemd[1]: Started sshd@79-147.75.203.55:22-139.178.89.65:52318.service - OpenSSH per-connection server daemon (139.178.89.65:52318). Jul 2 07:16:35.919943 sshd[2542]: Accepted publickey for core from 139.178.89.65 port 52318 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:35.920811 sshd[2542]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:35.923853 systemd-logind[1661]: New session 82 of user core. Jul 2 07:16:35.929885 systemd[1]: Started session-82.scope - Session 82 of User core. Jul 2 07:16:35.986199 sshd[2542]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:36.004952 systemd[1]: sshd@79-147.75.203.55:22-139.178.89.65:52318.service: Deactivated successfully. Jul 2 07:16:36.005517 systemd[1]: session-82.scope: Deactivated successfully. Jul 2 07:16:36.005944 systemd-logind[1661]: Session 82 logged out. Waiting for processes to exit. Jul 2 07:16:36.006545 systemd[1]: Started sshd@80-147.75.203.55:22-139.178.89.65:52334.service - OpenSSH per-connection server daemon (139.178.89.65:52334). Jul 2 07:16:36.007098 systemd-logind[1661]: Removed session 82. Jul 2 07:16:36.035419 sshd[2548]: Accepted publickey for core from 139.178.89.65 port 52334 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:36.036312 sshd[2548]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:36.039474 systemd-logind[1661]: New session 83 of user core. Jul 2 07:16:36.047894 systemd[1]: Started session-83.scope - Session 83 of User core. Jul 2 07:16:36.116602 sshd[2548]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:36.122926 systemd[1]: sshd@80-147.75.203.55:22-139.178.89.65:52334.service: Deactivated successfully. Jul 2 07:16:36.124728 systemd[1]: session-83.scope: Deactivated successfully. Jul 2 07:16:36.126518 systemd-logind[1661]: Session 83 logged out. Waiting for processes to exit. Jul 2 07:16:36.128898 systemd-logind[1661]: Removed session 83. Jul 2 07:16:46.143944 systemd[1]: Started sshd@81-147.75.203.55:22-139.178.89.65:39280.service - OpenSSH per-connection server daemon (139.178.89.65:39280). Jul 2 07:16:46.172906 sshd[2554]: Accepted publickey for core from 139.178.89.65 port 39280 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:46.173724 sshd[2554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:46.176674 systemd-logind[1661]: New session 84 of user core. Jul 2 07:16:46.191964 systemd[1]: Started session-84.scope - Session 84 of User core. Jul 2 07:16:46.250957 sshd[2554]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:46.266273 systemd[1]: sshd@81-147.75.203.55:22-139.178.89.65:39280.service: Deactivated successfully. Jul 2 07:16:46.266684 systemd[1]: session-84.scope: Deactivated successfully. Jul 2 07:16:46.267082 systemd-logind[1661]: Session 84 logged out. Waiting for processes to exit. Jul 2 07:16:46.267905 systemd[1]: Started sshd@82-147.75.203.55:22-139.178.89.65:39286.service - OpenSSH per-connection server daemon (139.178.89.65:39286). Jul 2 07:16:46.268453 systemd-logind[1661]: Removed session 84. Jul 2 07:16:46.297566 sshd[2560]: Accepted publickey for core from 139.178.89.65 port 39286 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:46.298406 sshd[2560]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:46.301524 systemd-logind[1661]: New session 85 of user core. Jul 2 07:16:46.314754 systemd[1]: Started session-85.scope - Session 85 of User core. Jul 2 07:16:46.384613 sshd[2560]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:46.390894 systemd[1]: sshd@82-147.75.203.55:22-139.178.89.65:39286.service: Deactivated successfully. Jul 2 07:16:46.392731 systemd[1]: session-85.scope: Deactivated successfully. Jul 2 07:16:46.394508 systemd-logind[1661]: Session 85 logged out. Waiting for processes to exit. Jul 2 07:16:46.396939 systemd-logind[1661]: Removed session 85. Jul 2 07:16:56.419037 systemd[1]: Started sshd@83-147.75.203.55:22-139.178.89.65:57472.service - OpenSSH per-connection server daemon (139.178.89.65:57472). Jul 2 07:16:56.448037 sshd[2566]: Accepted publickey for core from 139.178.89.65 port 57472 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:56.448827 sshd[2566]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:56.452105 systemd-logind[1661]: New session 86 of user core. Jul 2 07:16:56.462836 systemd[1]: Started session-86.scope - Session 86 of User core. Jul 2 07:16:56.520822 sshd[2566]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:56.537351 systemd[1]: sshd@83-147.75.203.55:22-139.178.89.65:57472.service: Deactivated successfully. Jul 2 07:16:56.537773 systemd[1]: session-86.scope: Deactivated successfully. Jul 2 07:16:56.538169 systemd-logind[1661]: Session 86 logged out. Waiting for processes to exit. Jul 2 07:16:56.539049 systemd[1]: Started sshd@84-147.75.203.55:22-139.178.89.65:57486.service - OpenSSH per-connection server daemon (139.178.89.65:57486). Jul 2 07:16:56.539607 systemd-logind[1661]: Removed session 86. Jul 2 07:16:56.570828 sshd[2572]: Accepted publickey for core from 139.178.89.65 port 57486 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:16:56.572269 sshd[2572]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:16:56.577618 systemd-logind[1661]: New session 87 of user core. Jul 2 07:16:56.599241 systemd[1]: Started session-87.scope - Session 87 of User core. Jul 2 07:16:56.681570 sshd[2572]: pam_unix(sshd:session): session closed for user core Jul 2 07:16:56.687814 systemd[1]: sshd@84-147.75.203.55:22-139.178.89.65:57486.service: Deactivated successfully. Jul 2 07:16:56.689942 systemd[1]: session-87.scope: Deactivated successfully. Jul 2 07:16:56.691863 systemd-logind[1661]: Session 87 logged out. Waiting for processes to exit. Jul 2 07:16:56.694099 systemd-logind[1661]: Removed session 87. Jul 2 07:17:06.698148 systemd[1]: Started sshd@85-147.75.203.55:22-139.178.89.65:58658.service - OpenSSH per-connection server daemon (139.178.89.65:58658). Jul 2 07:17:06.727208 sshd[2578]: Accepted publickey for core from 139.178.89.65 port 58658 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:06.730507 sshd[2578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:06.741378 systemd-logind[1661]: New session 88 of user core. Jul 2 07:17:06.754145 systemd[1]: Started session-88.scope - Session 88 of User core. Jul 2 07:17:06.825758 sshd[2578]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:06.841212 systemd[1]: sshd@85-147.75.203.55:22-139.178.89.65:58658.service: Deactivated successfully. Jul 2 07:17:06.841620 systemd[1]: session-88.scope: Deactivated successfully. Jul 2 07:17:06.842105 systemd-logind[1661]: Session 88 logged out. Waiting for processes to exit. Jul 2 07:17:06.842840 systemd[1]: Started sshd@86-147.75.203.55:22-139.178.89.65:58660.service - OpenSSH per-connection server daemon (139.178.89.65:58660). Jul 2 07:17:06.843529 systemd-logind[1661]: Removed session 88. Jul 2 07:17:06.874878 sshd[2584]: Accepted publickey for core from 139.178.89.65 port 58660 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:06.876704 sshd[2584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:06.883723 systemd-logind[1661]: New session 89 of user core. Jul 2 07:17:06.895104 systemd[1]: Started session-89.scope - Session 89 of User core. Jul 2 07:17:06.966117 sshd[2584]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:06.967484 systemd[1]: sshd@86-147.75.203.55:22-139.178.89.65:58660.service: Deactivated successfully. Jul 2 07:17:06.967926 systemd[1]: session-89.scope: Deactivated successfully. Jul 2 07:17:06.968300 systemd-logind[1661]: Session 89 logged out. Waiting for processes to exit. Jul 2 07:17:06.968872 systemd-logind[1661]: Removed session 89. Jul 2 07:17:16.982932 systemd[1]: Started sshd@87-147.75.203.55:22-139.178.89.65:56134.service - OpenSSH per-connection server daemon (139.178.89.65:56134). Jul 2 07:17:17.011456 sshd[2592]: Accepted publickey for core from 139.178.89.65 port 56134 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:17.012181 sshd[2592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:17.015051 systemd-logind[1661]: New session 90 of user core. Jul 2 07:17:17.030030 systemd[1]: Started session-90.scope - Session 90 of User core. Jul 2 07:17:17.087001 sshd[2592]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:17.100159 systemd[1]: sshd@87-147.75.203.55:22-139.178.89.65:56134.service: Deactivated successfully. Jul 2 07:17:17.100536 systemd[1]: session-90.scope: Deactivated successfully. Jul 2 07:17:17.100964 systemd-logind[1661]: Session 90 logged out. Waiting for processes to exit. Jul 2 07:17:17.101703 systemd[1]: Started sshd@88-147.75.203.55:22-139.178.89.65:56140.service - OpenSSH per-connection server daemon (139.178.89.65:56140). Jul 2 07:17:17.102201 systemd-logind[1661]: Removed session 90. Jul 2 07:17:17.130453 sshd[2598]: Accepted publickey for core from 139.178.89.65 port 56140 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:17.131361 sshd[2598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:17.134712 systemd-logind[1661]: New session 91 of user core. Jul 2 07:17:17.143859 systemd[1]: Started session-91.scope - Session 91 of User core. Jul 2 07:17:17.203211 sshd[2598]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:17.204517 systemd[1]: sshd@88-147.75.203.55:22-139.178.89.65:56140.service: Deactivated successfully. Jul 2 07:17:17.204952 systemd[1]: session-91.scope: Deactivated successfully. Jul 2 07:17:17.205318 systemd-logind[1661]: Session 91 logged out. Waiting for processes to exit. Jul 2 07:17:17.205948 systemd-logind[1661]: Removed session 91. Jul 2 07:17:27.229046 systemd[1]: Started sshd@89-147.75.203.55:22-139.178.89.65:39496.service - OpenSSH per-connection server daemon (139.178.89.65:39496). Jul 2 07:17:27.257338 sshd[2607]: Accepted publickey for core from 139.178.89.65 port 39496 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:27.258223 sshd[2607]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:27.261494 systemd-logind[1661]: New session 92 of user core. Jul 2 07:17:27.272857 systemd[1]: Started session-92.scope - Session 92 of User core. Jul 2 07:17:27.331147 sshd[2607]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:27.340017 systemd[1]: sshd@89-147.75.203.55:22-139.178.89.65:39496.service: Deactivated successfully. Jul 2 07:17:27.340345 systemd[1]: session-92.scope: Deactivated successfully. Jul 2 07:17:27.340760 systemd-logind[1661]: Session 92 logged out. Waiting for processes to exit. Jul 2 07:17:27.341414 systemd[1]: Started sshd@90-147.75.203.55:22-139.178.89.65:39508.service - OpenSSH per-connection server daemon (139.178.89.65:39508). Jul 2 07:17:27.341996 systemd-logind[1661]: Removed session 92. Jul 2 07:17:27.370902 sshd[2613]: Accepted publickey for core from 139.178.89.65 port 39508 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:27.371907 sshd[2613]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:27.375826 systemd-logind[1661]: New session 93 of user core. Jul 2 07:17:27.388026 systemd[1]: Started session-93.scope - Session 93 of User core. Jul 2 07:17:27.460772 sshd[2613]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:27.467106 systemd[1]: sshd@90-147.75.203.55:22-139.178.89.65:39508.service: Deactivated successfully. Jul 2 07:17:27.469257 systemd[1]: session-93.scope: Deactivated successfully. Jul 2 07:17:27.471248 systemd-logind[1661]: Session 93 logged out. Waiting for processes to exit. Jul 2 07:17:27.473510 systemd-logind[1661]: Removed session 93. Jul 2 07:17:32.728983 systemd[1]: Started sshd@91-147.75.203.55:22-61.177.172.140:25500.service - OpenSSH per-connection server daemon (61.177.172.140:25500). Jul 2 07:17:33.823668 sshd[2621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Jul 2 07:17:35.667994 sshd[2619]: PAM: Permission denied for root from 61.177.172.140 Jul 2 07:17:36.000401 sshd[2622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Jul 2 07:17:37.484427 systemd[1]: Started sshd@92-147.75.203.55:22-139.178.89.65:46660.service - OpenSSH per-connection server daemon (139.178.89.65:46660). Jul 2 07:17:37.513018 sshd[2624]: Accepted publickey for core from 139.178.89.65 port 46660 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:37.513901 sshd[2624]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:37.517060 systemd-logind[1661]: New session 94 of user core. Jul 2 07:17:37.526901 systemd[1]: Started session-94.scope - Session 94 of User core. Jul 2 07:17:37.584962 sshd[2624]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:37.596055 systemd[1]: sshd@92-147.75.203.55:22-139.178.89.65:46660.service: Deactivated successfully. Jul 2 07:17:37.596438 systemd[1]: session-94.scope: Deactivated successfully. Jul 2 07:17:37.596837 systemd-logind[1661]: Session 94 logged out. Waiting for processes to exit. Jul 2 07:17:37.597548 systemd[1]: Started sshd@93-147.75.203.55:22-139.178.89.65:46672.service - OpenSSH per-connection server daemon (139.178.89.65:46672). Jul 2 07:17:37.598038 systemd-logind[1661]: Removed session 94. Jul 2 07:17:37.628752 sshd[2630]: Accepted publickey for core from 139.178.89.65 port 46672 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:37.630025 sshd[2630]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:37.634611 systemd-logind[1661]: New session 95 of user core. Jul 2 07:17:37.645979 systemd[1]: Started session-95.scope - Session 95 of User core. Jul 2 07:17:37.713851 sshd[2630]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:37.716111 systemd[1]: sshd@93-147.75.203.55:22-139.178.89.65:46672.service: Deactivated successfully. Jul 2 07:17:37.716776 systemd[1]: session-95.scope: Deactivated successfully. Jul 2 07:17:37.717388 systemd-logind[1661]: Session 95 logged out. Waiting for processes to exit. Jul 2 07:17:37.718343 systemd-logind[1661]: Removed session 95. Jul 2 07:17:37.785164 sshd[2619]: PAM: Permission denied for root from 61.177.172.140 Jul 2 07:17:38.116318 sshd[2637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Jul 2 07:17:40.176899 sshd[2619]: PAM: Permission denied for root from 61.177.172.140 Jul 2 07:17:40.349942 sshd[2619]: Received disconnect from 61.177.172.140 port 25500:11: [preauth] Jul 2 07:17:40.349942 sshd[2619]: Disconnected from authenticating user root 61.177.172.140 port 25500 [preauth] Jul 2 07:17:40.353324 systemd[1]: sshd@91-147.75.203.55:22-61.177.172.140:25500.service: Deactivated successfully. Jul 2 07:17:40.542054 systemd[1]: Started sshd@94-147.75.203.55:22-61.177.172.140:17573.service - OpenSSH per-connection server daemon (61.177.172.140:17573). Jul 2 07:17:41.851273 sshd[2642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Jul 2 07:17:43.791786 sshd[2640]: PAM: Permission denied for root from 61.177.172.140 Jul 2 07:17:44.098763 sshd[2643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Jul 2 07:17:44.099123 sshd[2643]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jul 2 07:17:46.315095 sshd[2640]: PAM: Permission denied for root from 61.177.172.140 Jul 2 07:17:46.639152 sshd[2644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Jul 2 07:17:47.740834 systemd[1]: Started sshd@95-147.75.203.55:22-139.178.89.65:57344.service - OpenSSH per-connection server daemon (139.178.89.65:57344). Jul 2 07:17:47.769702 sshd[2646]: Accepted publickey for core from 139.178.89.65 port 57344 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:47.770504 sshd[2646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:47.773586 systemd-logind[1661]: New session 96 of user core. Jul 2 07:17:47.788850 systemd[1]: Started session-96.scope - Session 96 of User core. Jul 2 07:17:47.846406 sshd[2646]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:47.875805 systemd[1]: sshd@95-147.75.203.55:22-139.178.89.65:57344.service: Deactivated successfully. Jul 2 07:17:47.876287 systemd[1]: session-96.scope: Deactivated successfully. Jul 2 07:17:47.876822 systemd-logind[1661]: Session 96 logged out. Waiting for processes to exit. Jul 2 07:17:47.877770 systemd[1]: Started sshd@96-147.75.203.55:22-139.178.89.65:57360.service - OpenSSH per-connection server daemon (139.178.89.65:57360). Jul 2 07:17:47.878414 systemd-logind[1661]: Removed session 96. Jul 2 07:17:47.908567 sshd[2654]: Accepted publickey for core from 139.178.89.65 port 57360 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:47.909397 sshd[2654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:47.912520 systemd-logind[1661]: New session 97 of user core. Jul 2 07:17:47.920810 systemd[1]: Started session-97.scope - Session 97 of User core. Jul 2 07:17:47.989049 sshd[2654]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:47.995174 systemd[1]: sshd@96-147.75.203.55:22-139.178.89.65:57360.service: Deactivated successfully. Jul 2 07:17:47.997011 systemd[1]: session-97.scope: Deactivated successfully. Jul 2 07:17:47.998824 systemd-logind[1661]: Session 97 logged out. Waiting for processes to exit. Jul 2 07:17:48.001243 systemd-logind[1661]: Removed session 97. Jul 2 07:17:48.268311 sshd[2640]: PAM: Permission denied for root from 61.177.172.140 Jul 2 07:17:48.423098 sshd[2640]: Received disconnect from 61.177.172.140 port 17573:11: [preauth] Jul 2 07:17:48.423098 sshd[2640]: Disconnected from authenticating user root 61.177.172.140 port 17573 [preauth] Jul 2 07:17:48.426457 systemd[1]: sshd@94-147.75.203.55:22-61.177.172.140:17573.service: Deactivated successfully. Jul 2 07:17:48.606788 systemd[1]: Started sshd@97-147.75.203.55:22-61.177.172.140:14000.service - OpenSSH per-connection server daemon (61.177.172.140:14000). Jul 2 07:17:51.571309 sshd[2664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Jul 2 07:17:54.083089 sshd[2662]: PAM: Permission denied for root from 61.177.172.140 Jul 2 07:17:54.410388 sshd[2665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Jul 2 07:17:56.135167 sshd[2662]: PAM: Permission denied for root from 61.177.172.140 Jul 2 07:17:56.853339 sshd[2666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Jul 2 07:17:58.011856 systemd[1]: Started sshd@98-147.75.203.55:22-139.178.89.65:40036.service - OpenSSH per-connection server daemon (139.178.89.65:40036). Jul 2 07:17:58.040452 sshd[2668]: Accepted publickey for core from 139.178.89.65 port 40036 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:58.041306 sshd[2668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:58.044419 systemd-logind[1661]: New session 98 of user core. Jul 2 07:17:58.055848 systemd[1]: Started session-98.scope - Session 98 of User core. Jul 2 07:17:58.113450 sshd[2668]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:58.128124 systemd[1]: sshd@98-147.75.203.55:22-139.178.89.65:40036.service: Deactivated successfully. Jul 2 07:17:58.128502 systemd[1]: session-98.scope: Deactivated successfully. Jul 2 07:17:58.128928 systemd-logind[1661]: Session 98 logged out. Waiting for processes to exit. Jul 2 07:17:58.129673 systemd[1]: Started sshd@99-147.75.203.55:22-139.178.89.65:40050.service - OpenSSH per-connection server daemon (139.178.89.65:40050). Jul 2 07:17:58.130329 systemd-logind[1661]: Removed session 98. Jul 2 07:17:58.159384 sshd[2674]: Accepted publickey for core from 139.178.89.65 port 40050 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:17:58.160182 sshd[2674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:17:58.163331 systemd-logind[1661]: New session 99 of user core. Jul 2 07:17:58.175790 systemd[1]: Started session-99.scope - Session 99 of User core. Jul 2 07:17:58.233474 sshd[2674]: pam_unix(sshd:session): session closed for user core Jul 2 07:17:58.234815 systemd[1]: sshd@99-147.75.203.55:22-139.178.89.65:40050.service: Deactivated successfully. Jul 2 07:17:58.235206 systemd[1]: session-99.scope: Deactivated successfully. Jul 2 07:17:58.235501 systemd-logind[1661]: Session 99 logged out. Waiting for processes to exit. Jul 2 07:17:58.236168 systemd-logind[1661]: Removed session 99. Jul 2 07:17:59.189812 sshd[2662]: PAM: Permission denied for root from 61.177.172.140 Jul 2 07:17:59.352976 sshd[2662]: Received disconnect from 61.177.172.140 port 14000:11: [preauth] Jul 2 07:17:59.352976 sshd[2662]: Disconnected from authenticating user root 61.177.172.140 port 14000 [preauth] Jul 2 07:17:59.356388 systemd[1]: sshd@97-147.75.203.55:22-61.177.172.140:14000.service: Deactivated successfully. Jul 2 07:18:08.263989 systemd[1]: Started sshd@100-147.75.203.55:22-139.178.89.65:59852.service - OpenSSH per-connection server daemon (139.178.89.65:59852). Jul 2 07:18:08.292650 sshd[2683]: Accepted publickey for core from 139.178.89.65 port 59852 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:18:08.293621 sshd[2683]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:18:08.294465 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.294Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"53f55400f8b40367"} Jul 2 07:18:08.294465 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.294Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Jul 2 07:18:08.296033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.295Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"31d2d136df99400d","cluster-id":"8ba8b6bbc2ae7f2f"} Jul 2 07:18:08.296033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.295Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=()"} Jul 2 07:18:08.296033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.295Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d became follower at term 0"} Jul 2 07:18:08.296033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.295Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 31d2d136df99400d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Jul 2 07:18:08.296033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.295Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d became follower at term 1"} Jul 2 07:18:08.296289 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.295Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=(3590161886577508365)"} Jul 2 07:18:08.296289 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.295Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=(3590161886577508365 5314461867781772999)"} Jul 2 07:18:08.296289 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.295Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=(3590161886577508365 5314461867781772999 6049834037591409511)"} Jul 2 07:18:08.296431 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:08.296Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Jul 2 07:18:08.296474 systemd-logind[1661]: New session 100 of user core. Jul 2 07:18:08.297162 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Jul 2 07:18:08.297440 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jul 2 07:18:08.297687 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.297687 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.297928 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.298005 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.298005 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.298005 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7","remote-peer-urls":["http://10.67.80.33:2380"]} Jul 2 07:18:08.298005 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.298156 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.298156 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.297Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.298156 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.298Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.298554 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.298Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.298784 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.298Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.299033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.298Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.299033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.298Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367","remote-peer-urls":["http://10.67.80.31:2380"]} Jul 2 07:18:08.299033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.298Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.299033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.298Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.299033 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.298Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"31d2d136df99400d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Jul 2 07:18:08.299261 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.299Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Jul 2 07:18:08.299334 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.299Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=(3590161886577508365 5314461867781772999 6049834037591409511)"} Jul 2 07:18:08.299373 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.299Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","added-peer-id":"31d2d136df99400d","added-peer-peer-urls":["http://10.67.80.25:2380"]} Jul 2 07:18:08.299405 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.299Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=(3590161886577508365 5314461867781772999 6049834037591409511)"} Jul 2 07:18:08.299437 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.299Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","added-peer-id":"49c0c2e9597dd6c7","added-peer-peer-urls":["http://10.67.80.33:2380"]} Jul 2 07:18:08.299482 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.299Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=(3590161886577508365 5314461867781772999 6049834037591409511)"} Jul 2 07:18:08.299520 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.299Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","added-peer-id":"53f55400f8b40367","added-peer-peer-urls":["http://10.67.80.31:2380"]} Jul 2 07:18:08.300246 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:08.300Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Jul 2 07:18:08.300350 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.300Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"31d2d136df99400d","initial-advertise-peer-urls":["http://10.67.80.25:2380"],"listen-peer-urls":["http://10.67.80.25:2380"],"advertise-client-urls":["http://10.67.80.25:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Jul 2 07:18:08.300350 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.300Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.25:2380"} Jul 2 07:18:08.300350 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.300Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.25:2380"} Jul 2 07:18:08.309021 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.308Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"31d2d136df99400d","to":"49c0c2e9597dd6c7","stream-type":"stream MsgApp v2"} Jul 2 07:18:08.309021 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.308Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.309021 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.308Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.309159 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.308Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"31d2d136df99400d","to":"49c0c2e9597dd6c7","stream-type":"stream Message"} Jul 2 07:18:08.309159 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.308Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.312098 systemd[1]: Started session-100.scope - Session 100 of User core. Jul 2 07:18:08.318272 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.317Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.318272 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.317Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:08.384251 sshd[2683]: pam_unix(sshd:session): session closed for user core Jul 2 07:18:08.393091 systemd[1]: sshd@100-147.75.203.55:22-139.178.89.65:59852.service: Deactivated successfully. Jul 2 07:18:08.393449 systemd[1]: session-100.scope: Deactivated successfully. Jul 2 07:18:08.393830 systemd-logind[1661]: Session 100 logged out. Waiting for processes to exit. Jul 2 07:18:08.394560 systemd[1]: Started sshd@101-147.75.203.55:22-139.178.89.65:59860.service - OpenSSH per-connection server daemon (139.178.89.65:59860). Jul 2 07:18:08.395138 systemd-logind[1661]: Removed session 100. Jul 2 07:18:08.424032 sshd[2690]: Accepted publickey for core from 139.178.89.65 port 59860 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:18:08.424826 sshd[2690]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:18:08.428024 systemd-logind[1661]: New session 101 of user core. Jul 2 07:18:08.442861 systemd[1]: Started session-101.scope - Session 101 of User core. Jul 2 07:18:08.512087 sshd[2690]: pam_unix(sshd:session): session closed for user core Jul 2 07:18:08.518309 systemd[1]: sshd@101-147.75.203.55:22-139.178.89.65:59860.service: Deactivated successfully. Jul 2 07:18:08.520091 systemd[1]: session-101.scope: Deactivated successfully. Jul 2 07:18:08.521914 systemd-logind[1661]: Session 101 logged out. Waiting for processes to exit. Jul 2 07:18:08.524376 systemd-logind[1661]: Removed session 101. Jul 2 07:18:08.545089 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.544Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"31d2d136df99400d","to":"53f55400f8b40367","stream-type":"stream MsgApp v2"} Jul 2 07:18:08.545089 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.544Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"53f55400f8b40367"} Jul 2 07:18:08.545089 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.544Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.546545 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.546Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"31d2d136df99400d","to":"53f55400f8b40367","stream-type":"stream Message"} Jul 2 07:18:08.546545 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.546Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.549741 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.549Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.550009 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.549Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:08.553076 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.552Z","caller":"etcdserver/server.go:767","msg":"initialized peer connections; fast-forwarding election ticks","local-member-id":"31d2d136df99400d","forward-ticks":8,"forward-duration":"800ms","election-ticks":10,"election-timeout":"1s","active-remote-members":2} Jul 2 07:18:08.738773 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.738Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 53f55400f8b40367 [logterm: 1, index: 3] at term 1"} Jul 2 07:18:08.740109 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.739Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d [term: 1] received a MsgVote message with higher term from 53f55400f8b40367 [term: 2]"} Jul 2 07:18:08.740109 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.739Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d became follower at term 2"} Jul 2 07:18:08.740109 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.739Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d [logterm: 1, index: 3, vote: 0] cast MsgVote for 53f55400f8b40367 [logterm: 1, index: 3] at term 2"} Jul 2 07:18:08.741498 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.741Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 31d2d136df99400d elected leader 53f55400f8b40367 at term 2"} Jul 2 07:18:08.746106 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.745Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"31d2d136df99400d","local-member-attributes":"{Name:7fbb7fe2e6db47cc932d250109ba48dd ClientURLs:[http://10.67.80.25:2379]}","request-path":"/0/members/31d2d136df99400d/attributes","cluster-id":"8ba8b6bbc2ae7f2f","publish-timeout":"7s"} Jul 2 07:18:08.746106 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.745Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jul 2 07:18:08.746610 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.746Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Jul 2 07:18:08.746610 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.746Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Jul 2 07:18:08.746614 systemd[1]: Started etcd-member.service - etcd (System Application Container). Jul 2 07:18:08.747153 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.746Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","cluster-version":"3.5"} Jul 2 07:18:08.747332 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.746Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Jul 2 07:18:08.748402 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:08.747Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Jul 2 07:18:08.769666 systemd[1]: Starting flanneld.service - flannel - Network fabric for containers (System Application Container)... Jul 2 07:18:08.833853 etcdctl[2698]: { "Network": "10.254.0.0/16", "Backend": {"Type": "vxlan"} } Jul 2 07:18:08.857705 flannel-wrapper[2720]: Error response from daemon: No such container: flannel Jul 2 07:18:08.868518 flannel-wrapper[2728]: Error response from daemon: No such container: flannel Jul 2 07:18:08.883529 flannel-wrapper[2746]: Unable to find image 'quay.io/coreos/flannel:v0.14.0' locally Jul 2 07:18:10.123813 flannel-wrapper[2746]: v0.14.0: Pulling from coreos/flannel Jul 2 07:18:10.430733 flannel-wrapper[2746]: 801bfaa63ef2: Pulling fs layer Jul 2 07:18:10.430733 flannel-wrapper[2746]: e4264a7179f6: Pulling fs layer Jul 2 07:18:10.430733 flannel-wrapper[2746]: bc75ea45ad2e: Pulling fs layer Jul 2 07:18:10.430733 flannel-wrapper[2746]: 78648579d12a: Pulling fs layer Jul 2 07:18:10.430733 flannel-wrapper[2746]: 3393447261e4: Pulling fs layer Jul 2 07:18:10.430733 flannel-wrapper[2746]: 071b96dd834b: Pulling fs layer Jul 2 07:18:10.431907 flannel-wrapper[2746]: 4de2f0468a91: Pulling fs layer Jul 2 07:18:10.431907 flannel-wrapper[2746]: 071b96dd834b: Waiting Jul 2 07:18:10.431907 flannel-wrapper[2746]: 78648579d12a: Waiting Jul 2 07:18:10.431907 flannel-wrapper[2746]: 3393447261e4: Waiting Jul 2 07:18:10.431907 flannel-wrapper[2746]: 4de2f0468a91: Waiting Jul 2 07:18:10.784675 flannel-wrapper[2746]: bc75ea45ad2e: Verifying Checksum Jul 2 07:18:10.784675 flannel-wrapper[2746]: bc75ea45ad2e: Download complete Jul 2 07:18:10.807458 flannel-wrapper[2746]: 801bfaa63ef2: Verifying Checksum Jul 2 07:18:10.807458 flannel-wrapper[2746]: 801bfaa63ef2: Download complete Jul 2 07:18:10.846132 flannel-wrapper[2746]: e4264a7179f6: Verifying Checksum Jul 2 07:18:10.846132 flannel-wrapper[2746]: e4264a7179f6: Download complete Jul 2 07:18:10.939871 flannel-wrapper[2746]: 801bfaa63ef2: Pull complete Jul 2 07:18:11.039800 systemd[1]: var-lib-docker-overlay2-2f8af553f0a1805f525617f1fe948dc722eccb4625f9d65f2c61892711dec821-merged.mount: Deactivated successfully. Jul 2 07:18:11.099976 flannel-wrapper[2746]: e4264a7179f6: Pull complete Jul 2 07:18:11.130629 flannel-wrapper[2746]: 3393447261e4: Download complete Jul 2 07:18:11.159026 flannel-wrapper[2746]: 071b96dd834b: Verifying Checksum Jul 2 07:18:11.159026 flannel-wrapper[2746]: 071b96dd834b: Download complete Jul 2 07:18:11.179423 systemd[1]: var-lib-docker-overlay2-70fc3bdab0a95af8875fc9a404291a0774314aa369b510fbfa6fc6a891978f71-merged.mount: Deactivated successfully. Jul 2 07:18:11.206295 flannel-wrapper[2746]: bc75ea45ad2e: Pull complete Jul 2 07:18:11.232427 flannel-wrapper[2746]: 78648579d12a: Verifying Checksum Jul 2 07:18:11.232427 flannel-wrapper[2746]: 78648579d12a: Download complete Jul 2 07:18:11.440681 flannel-wrapper[2746]: 4de2f0468a91: Verifying Checksum Jul 2 07:18:11.440681 flannel-wrapper[2746]: 4de2f0468a91: Download complete Jul 2 07:18:11.532464 flannel-wrapper[2746]: 78648579d12a: Pull complete Jul 2 07:18:11.561968 flannel-wrapper[2746]: 3393447261e4: Pull complete Jul 2 07:18:11.579646 flannel-wrapper[2746]: 071b96dd834b: Pull complete Jul 2 07:18:11.598898 flannel-wrapper[2746]: 4de2f0468a91: Pull complete Jul 2 07:18:11.623878 flannel-wrapper[2746]: Digest: sha256:4a330b2f2e74046e493b2edc30d61fdebbdddaaedcb32d62736f25be8d3c64d5 Jul 2 07:18:11.626336 flannel-wrapper[2746]: Status: Downloaded newer image for quay.io/coreos/flannel:v0.14.0 Jul 2 07:18:11.714733 containerd[1669]: time="2024-07-02T07:18:11.714343310Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:18:11.714733 containerd[1669]: time="2024-07-02T07:18:11.714476391Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:11.714733 containerd[1669]: time="2024-07-02T07:18:11.714525484Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:18:11.714733 containerd[1669]: time="2024-07-02T07:18:11.714558010Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:11.758065 systemd[1]: Started docker-b6f840e7ed07a078debfe034a3a88a204c90447290db3c4fd1262aa5f0901f1d.scope - libcontainer container b6f840e7ed07a078debfe034a3a88a204c90447290db3c4fd1262aa5f0901f1d. Jul 2 07:18:11.825752 flannel-wrapper[2746]: I0702 07:18:11.825491 1 main.go:520] Determining IP address of default interface Jul 2 07:18:11.826011 flannel-wrapper[2746]: I0702 07:18:11.825854 1 main.go:533] Using interface with name bond0 and address 147.75.203.55 Jul 2 07:18:11.826011 flannel-wrapper[2746]: I0702 07:18:11.825871 1 main.go:550] Defaulting external address to interface address (147.75.203.55) Jul 2 07:18:11.826153 flannel-wrapper[2746]: I0702 07:18:11.825977 1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: None Jul 2 07:18:11.826153 flannel-wrapper[2746]: I0702 07:18:11.825989 1 main.go:257] Installing signal handlers Jul 2 07:18:11.828078 flannel-wrapper[2746]: I0702 07:18:11.827899 1 main.go:392] Found network config - Backend type: vxlan Jul 2 07:18:11.828078 flannel-wrapper[2746]: I0702 07:18:11.827939 1 vxlan.go:123] VXLAN config: VNI=1 Port=0 GBP=false Learning=false DirectRouting=false Jul 2 07:18:11.845866 flannel-wrapper[2746]: I0702 07:18:11.845741 1 local_manager.go:234] Picking subnet in range 10.254.1.0 ... 10.254.255.0 Jul 2 07:18:11.847077 flannel-wrapper[2746]: I0702 07:18:11.846916 1 local_manager.go:220] Allocated lease (10.254.75.0/24) to current node (147.75.203.55) Jul 2 07:18:11.847223 flannel-wrapper[2746]: I0702 07:18:11.847158 1 main.go:357] Current network or subnet (10.254.0.0/16, 10.254.75.0/24) is not equal to previous one (0.0.0.0/0, 0.0.0.0/0), trying to recycle old iptables rules Jul 2 07:18:11.847265 systemd-networkd[1427]: flannel.1: Link UP Jul 2 07:18:11.847268 systemd-networkd[1427]: flannel.1: Gained carrier Jul 2 07:18:11.856023 flannel-wrapper[2746]: I0702 07:18:11.855892 1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN Jul 2 07:18:11.856671 flannel-wrapper[2746]: I0702 07:18:11.856517 1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Jul 2 07:18:11.857161 flannel-wrapper[2746]: I0702 07:18:11.857019 1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN Jul 2 07:18:11.857759 flannel-wrapper[2746]: I0702 07:18:11.857620 1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j MASQUERADE --random-fully Jul 2 07:18:11.858226 flannel-wrapper[2746]: I0702 07:18:11.858162 1 main.go:307] Setting up masking rules Jul 2 07:18:11.858656 flannel-wrapper[2746]: I0702 07:18:11.858607 1 main.go:315] Changing default FORWARD chain policy to ACCEPT Jul 2 07:18:11.858696 flannel-wrapper[2746]: I0702 07:18:11.858652 1 main.go:323] Wrote subnet file to /run/flannel/subnet.env Jul 2 07:18:11.858696 flannel-wrapper[2746]: I0702 07:18:11.858658 1 main.go:327] Running backend. Jul 2 07:18:11.858773 flannel-wrapper[2746]: I0702 07:18:11.858699 1 vxlan_network.go:59] watching for new subnet leases Jul 2 07:18:11.858813 systemd[1]: Started flanneld.service - flannel - Network fabric for containers (System Application Container). Jul 2 07:18:11.859020 systemd[1]: Reached target multi-user.target - Multi-User System. Jul 2 07:18:11.859887 flannel-wrapper[2746]: I0702 07:18:11.859815 1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules Jul 2 07:18:11.859887 flannel-wrapper[2746]: I0702 07:18:11.859822 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN Jul 2 07:18:11.859974 flannel-wrapper[2746]: I0702 07:18:11.859861 1 main.go:439] Waiting for 22h59m59.986203928s to renew lease Jul 2 07:18:11.860037 flannel-wrapper[2746]: I0702 07:18:11.859990 1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules Jul 2 07:18:11.860037 flannel-wrapper[2746]: I0702 07:18:11.859995 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -j ACCEPT Jul 2 07:18:11.860471 flannel-wrapper[2746]: I0702 07:18:11.860426 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Jul 2 07:18:11.860696 flannel-wrapper[2746]: I0702 07:18:11.860653 1 iptables.go:172] Deleting iptables rule: -d 10.254.0.0/16 -j ACCEPT Jul 2 07:18:11.861019 flannel-wrapper[2746]: I0702 07:18:11.860983 1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.75.0/24 -j RETURN Jul 2 07:18:11.861392 flannel-wrapper[2746]: I0702 07:18:11.861308 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -j ACCEPT Jul 2 07:18:11.861561 flannel-wrapper[2746]: I0702 07:18:11.861519 1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully Jul 2 07:18:11.862110 flannel-wrapper[2746]: I0702 07:18:11.862061 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN Jul 2 07:18:11.862527 flannel-wrapper[2746]: I0702 07:18:11.862460 1 iptables.go:160] Adding iptables rule: -d 10.254.0.0/16 -j ACCEPT Jul 2 07:18:11.863289 flannel-wrapper[2746]: I0702 07:18:11.863202 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Jul 2 07:18:11.864470 flannel-wrapper[2746]: I0702 07:18:11.864362 1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.75.0/24 -j RETURN Jul 2 07:18:11.865590 flannel-wrapper[2746]: I0702 07:18:11.865478 1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully Jul 2 07:18:11.872887 systemd[1]: Starting flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)... Jul 2 07:18:11.873810 systemd[1]: Starting systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP... Jul 2 07:18:11.875118 sh[2881]: + for try in 1 2 3 4 5 6 Jul 2 07:18:11.875118 sh[2881]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i Jul 2 07:18:11.878128 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:18:11.878239 systemd[1]: Finished systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP. Jul 2 07:18:11.884772 sh[2902]: Error response from daemon: No such container: flannel-docker-opts Jul 2 07:18:11.892128 sh[2911]: Error response from daemon: No such container: flannel-docker-opts Jul 2 07:18:11.927406 containerd[1669]: time="2024-07-02T07:18:11.927347426Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:18:11.927406 containerd[1669]: time="2024-07-02T07:18:11.927391103Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:11.927629 containerd[1669]: time="2024-07-02T07:18:11.927409550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:18:11.927629 containerd[1669]: time="2024-07-02T07:18:11.927419732Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:11.942102 systemd[1]: Started docker-c79a24d881faf9206eb3a69e7eecdddc5bec4d778ebb978dc934889bb70dab26.scope - libcontainer container c79a24d881faf9206eb3a69e7eecdddc5bec4d778ebb978dc934889bb70dab26. Jul 2 07:18:11.951331 systemd[1]: var-lib-docker-overlay2-9363ef6fa391924c1f4a8b009f0cd36b605746ef71fd4d2422b1984190d9f5bc-merged.mount: Deactivated successfully. Jul 2 07:18:12.010460 systemd[1]: docker-c79a24d881faf9206eb3a69e7eecdddc5bec4d778ebb978dc934889bb70dab26.scope: Deactivated successfully. Jul 2 07:18:12.042348 dockerd[1779]: time="2024-07-02T07:18:12.042240780Z" level=info msg="ignoring event" container=c79a24d881faf9206eb3a69e7eecdddc5bec4d778ebb978dc934889bb70dab26 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 07:18:12.043391 containerd[1669]: time="2024-07-02T07:18:12.042512429Z" level=info msg="shim disconnected" id=c79a24d881faf9206eb3a69e7eecdddc5bec4d778ebb978dc934889bb70dab26 namespace=moby Jul 2 07:18:12.043391 containerd[1669]: time="2024-07-02T07:18:12.042663871Z" level=warning msg="cleaning up after shim disconnected" id=c79a24d881faf9206eb3a69e7eecdddc5bec4d778ebb978dc934889bb70dab26 namespace=moby Jul 2 07:18:12.043391 containerd[1669]: time="2024-07-02T07:18:12.042693380Z" level=info msg="cleaning up dead shim" namespace=moby Jul 2 07:18:12.075636 systemd[1]: var-lib-docker-overlay2-b488e8634e40ab5279a59f848e7965b723212fe39edf2009f6637456ef03026a-merged.mount: Deactivated successfully. Jul 2 07:18:12.092889 dockerd[1779]: time="2024-07-02T07:18:12.092783454Z" level=info msg="Processing signal 'terminated'" Jul 2 07:18:12.092934 systemd[1]: Stopping docker.service - Docker Application Container Engine... Jul 2 07:18:12.104768 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.104Z","caller":"osutil/interrupt_unix.go:64","msg":"received signal; shutting down","signal":"terminated"} Jul 2 07:18:12.104768 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.104Z","caller":"embed/etcd.go:367","msg":"closing etcd server","name":"7fbb7fe2e6db47cc932d250109ba48dd","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.67.80.25:2380"],"advertise-client-urls":["http://10.67.80.25:2379"]} Jul 2 07:18:12.105693 flannel-wrapper[2746]: I0702 07:18:12.104408 1 main.go:376] shutdownHandler sent cancel signal... Jul 2 07:18:12.105693 flannel-wrapper[2746]: I0702 07:18:12.104544 1 watch.go:40] context canceled, close receiver chan Jul 2 07:18:12.105693 flannel-wrapper[2746]: I0702 07:18:12.104557 1 watch.go:174] context canceled, close receiver chan Jul 2 07:18:12.105693 flannel-wrapper[2746]: I0702 07:18:12.104602 1 vxlan_network.go:74] evts chan closed Jul 2 07:18:12.105693 flannel-wrapper[2746]: I0702 07:18:12.104615 1 main.go:432] Stopped monitoring lease Jul 2 07:18:12.105693 flannel-wrapper[2746]: I0702 07:18:12.104640 1 main.go:345] Waiting for all goroutines to exit Jul 2 07:18:12.105693 flannel-wrapper[2746]: I0702 07:18:12.104680 1 main.go:348] Exiting cleanly... Jul 2 07:18:12.106324 etcd-wrapper[1942]: WARNING: 2024/07/02 07:18:12 [core] grpc: addrConn.createTransport failed to connect to {0.0.0.0:2379 0.0.0.0:2379 0 }. Err: connection error: desc = "transport: Error while dialing dial tcp 0.0.0.0:2379: connect: connection refused". Reconnecting... Jul 2 07:18:12.106493 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.106Z","caller":"etcdserver/server.go:1429","msg":"skipped leadership transfer; local server is not leader","local-member-id":"31d2d136df99400d","current-leader-member-id":"53f55400f8b40367"} Jul 2 07:18:12.106704 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.106Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:12.107950 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.106Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:12.107950 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.107Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:12.108050 systemd[1]: docker-b6f840e7ed07a078debfe034a3a88a204c90447290db3c4fd1262aa5f0901f1d.scope: Deactivated successfully. Jul 2 07:18:12.108829 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.108Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:12.108829 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.108Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:12.109331 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.108Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:12.109331 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.108Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7","error":"context canceled"} Jul 2 07:18:12.109331 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.109Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"49c0c2e9597dd6c7","error":"failed to read 49c0c2e9597dd6c7 on stream MsgApp v2 (context canceled)"} Jul 2 07:18:12.109331 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.109Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:12.109985 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.109Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7","error":"context canceled"} Jul 2 07:18:12.110110 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.109Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:12.110110 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.109Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:12.110110 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.109Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:12.110775 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.110Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:12.110775 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.110Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:12.111171 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.110Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:12.111316 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:12.111316 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:12.111571 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367","error":"context canceled"} Jul 2 07:18:12.111571 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"53f55400f8b40367","error":"failed to read 53f55400f8b40367 on stream MsgApp v2 (context canceled)"} Jul 2 07:18:12.111571 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:12.111571 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367","error":"context canceled"} Jul 2 07:18:12.111571 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:12.111571 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:12.112341 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"31d2d136df99400d","remote-peer-id-stream-handler":"31d2d136df99400d","remote-peer-id-from":"53f55400f8b40367","cluster-id":"8ba8b6bbc2ae7f2f"} Jul 2 07:18:12.112341 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"31d2d136df99400d","remote-peer-id-stream-handler":"31d2d136df99400d","remote-peer-id-from":"49c0c2e9597dd6c7","cluster-id":"8ba8b6bbc2ae7f2f"} Jul 2 07:18:12.112341 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"31d2d136df99400d","remote-peer-id-stream-handler":"31d2d136df99400d","remote-peer-id-from":"49c0c2e9597dd6c7","cluster-id":"8ba8b6bbc2ae7f2f"} Jul 2 07:18:12.112341 etcd-wrapper[1942]: {"level":"warn","ts":"2024-07-02T07:18:12.111Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"31d2d136df99400d","remote-peer-id-stream-handler":"31d2d136df99400d","remote-peer-id-from":"53f55400f8b40367","cluster-id":"8ba8b6bbc2ae7f2f"} Jul 2 07:18:12.112750 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.112Z","caller":"embed/etcd.go:562","msg":"stopping serving peer traffic","address":"10.67.80.25:2380"} Jul 2 07:18:12.113976 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.113Z","caller":"embed/etcd.go:567","msg":"stopped serving peer traffic","address":"10.67.80.25:2380"} Jul 2 07:18:12.113976 etcd-wrapper[1942]: {"level":"info","ts":"2024-07-02T07:18:12.113Z","caller":"embed/etcd.go:369","msg":"closed etcd server","name":"7fbb7fe2e6db47cc932d250109ba48dd","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.67.80.25:2380"],"advertise-client-urls":["http://10.67.80.25:2379"]} Jul 2 07:18:12.116763 systemd[1]: docker-75a2d060cd2a6a81bfa4e4c4e0c65adbcc1b9ca129fdbc1d826e50cbf2603575.scope: Deactivated successfully. Jul 2 07:18:12.117140 systemd[1]: docker-75a2d060cd2a6a81bfa4e4c4e0c65adbcc1b9ca129fdbc1d826e50cbf2603575.scope: Consumed 1.168s CPU time. Jul 2 07:18:12.129567 containerd[1669]: time="2024-07-02T07:18:12.129504782Z" level=info msg="shim disconnected" id=b6f840e7ed07a078debfe034a3a88a204c90447290db3c4fd1262aa5f0901f1d namespace=moby Jul 2 07:18:12.129728 containerd[1669]: time="2024-07-02T07:18:12.129566304Z" level=warning msg="cleaning up after shim disconnected" id=b6f840e7ed07a078debfe034a3a88a204c90447290db3c4fd1262aa5f0901f1d namespace=moby Jul 2 07:18:12.129728 containerd[1669]: time="2024-07-02T07:18:12.129596250Z" level=info msg="cleaning up dead shim" namespace=moby Jul 2 07:18:12.129831 dockerd[1779]: time="2024-07-02T07:18:12.129649661Z" level=info msg="ignoring event" container=b6f840e7ed07a078debfe034a3a88a204c90447290db3c4fd1262aa5f0901f1d module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 07:18:12.132936 dockerd[1779]: time="2024-07-02T07:18:12.132889582Z" level=info msg="ignoring event" container=75a2d060cd2a6a81bfa4e4c4e0c65adbcc1b9ca129fdbc1d826e50cbf2603575 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 07:18:12.133104 containerd[1669]: time="2024-07-02T07:18:12.133054386Z" level=info msg="shim disconnected" id=75a2d060cd2a6a81bfa4e4c4e0c65adbcc1b9ca129fdbc1d826e50cbf2603575 namespace=moby Jul 2 07:18:12.133181 containerd[1669]: time="2024-07-02T07:18:12.133105090Z" level=warning msg="cleaning up after shim disconnected" id=75a2d060cd2a6a81bfa4e4c4e0c65adbcc1b9ca129fdbc1d826e50cbf2603575 namespace=moby Jul 2 07:18:12.133181 containerd[1669]: time="2024-07-02T07:18:12.133117407Z" level=info msg="cleaning up dead shim" namespace=moby Jul 2 07:18:12.145338 systemd[1]: var-lib-docker-overlay2-2c55e0f3b08d9c3e09d5b9533455a6ad4a4de5bccef659c36f50adcbc3fda8cc-merged.mount: Deactivated successfully. Jul 2 07:18:12.150079 systemd[1]: var-lib-docker-overlay2-393c7ae8460b4c367599cfa8a2b5d2b2d2d992126f4b4d2b53d47772e176a195-merged.mount: Deactivated successfully. Jul 2 07:18:12.151721 dockerd[1779]: time="2024-07-02T07:18:12.151665462Z" level=info msg="stopping event stream following graceful shutdown" error="" module=libcontainerd namespace=moby Jul 2 07:18:12.151999 dockerd[1779]: time="2024-07-02T07:18:12.151950081Z" level=info msg="Daemon shutdown complete" Jul 2 07:18:12.168356 systemd[1]: docker.service: Deactivated successfully. Jul 2 07:18:12.168604 systemd[1]: Stopped docker.service - Docker Application Container Engine. Jul 2 07:18:12.168652 systemd[1]: docker.service: Consumed 4.123s CPU time. Jul 2 07:18:12.169072 systemd[1]: docker.socket: Deactivated successfully. Jul 2 07:18:12.169364 systemd[1]: Closed docker.socket - Docker Socket for the API. Jul 2 07:18:12.169399 systemd[1]: Stopping docker.socket - Docker Socket for the API... Jul 2 07:18:12.170830 systemd[1]: Starting docker.socket - Docker Socket for the API... Jul 2 07:18:12.171571 systemd[1]: Listening on docker.socket - Docker Socket for the API. Jul 2 07:18:12.173349 systemd[1]: Starting docker.service - Docker Application Container Engine... Jul 2 07:18:12.207379 dockerd[3069]: time="2024-07-02T07:18:12.207307472Z" level=info msg="Starting up" Jul 2 07:18:12.218282 dockerd[3069]: time="2024-07-02T07:18:12.218228356Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Jul 2 07:18:12.228731 dockerd[3069]: time="2024-07-02T07:18:12.228686464Z" level=info msg="Loading containers: start." Jul 2 07:18:12.689017 dockerd[3069]: time="2024-07-02T07:18:12.688908374Z" level=info msg="Loading containers: done." Jul 2 07:18:12.709210 dockerd[3069]: time="2024-07-02T07:18:12.709105209Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:18:12.709599 dockerd[3069]: time="2024-07-02T07:18:12.709536270Z" level=info msg="Docker daemon" commit=fca702de7f71362c8d103073c7e4a1d0a467fadd graphdriver=overlay2 version=24.0.9 Jul 2 07:18:12.709753 dockerd[3069]: time="2024-07-02T07:18:12.709662511Z" level=info msg="Daemon has completed initialization" Jul 2 07:18:12.755290 dockerd[3069]: time="2024-07-02T07:18:12.755151418Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:18:12.755467 systemd[1]: Started docker.service - Docker Application Container Engine. Jul 2 07:18:12.757051 docker[3057]: etcd-member Jul 2 07:18:12.757714 docker[3056]: flannel Jul 2 07:18:12.758145 sh[2900]: Restarted Docker to apply Flannel options Jul 2 07:18:12.758459 sh[2881]: + break Jul 2 07:18:12.758459 sh[2881]: + '[' 1 '!=' fail ']' Jul 2 07:18:12.760981 systemd[1]: Finished flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container). Jul 2 07:18:12.761572 systemd[1]: Startup finished in 1.815s (kernel) + 17.343s (initrd) + 8min 32.098s (userspace) = 8min 51.256s. Jul 2 07:18:12.821350 docker[3218]: flannel Jul 2 07:18:12.823110 docker[3219]: etcd-member Jul 2 07:18:12.824116 systemd[1]: flanneld.service: Deactivated successfully. Jul 2 07:18:12.825836 systemd[1]: etcd-member.service: Deactivated successfully. Jul 2 07:18:13.232885 systemd-networkd[1427]: flannel.1: Gained IPv6LL Jul 2 07:18:18.528986 systemd[1]: Started sshd@102-147.75.203.55:22-139.178.89.65:54470.service - OpenSSH per-connection server daemon (139.178.89.65:54470). Jul 2 07:18:18.557371 sshd[3238]: Accepted publickey for core from 139.178.89.65 port 54470 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:18:18.558226 sshd[3238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:18:18.561407 systemd-logind[1661]: New session 102 of user core. Jul 2 07:18:18.575936 systemd[1]: Started session-102.scope - Session 102 of User core. Jul 2 07:18:18.636188 sshd[3238]: pam_unix(sshd:session): session closed for user core Jul 2 07:18:18.655007 systemd[1]: sshd@102-147.75.203.55:22-139.178.89.65:54470.service: Deactivated successfully. Jul 2 07:18:18.655487 systemd[1]: session-102.scope: Deactivated successfully. Jul 2 07:18:18.655870 systemd-logind[1661]: Session 102 logged out. Waiting for processes to exit. Jul 2 07:18:18.656469 systemd[1]: Started sshd@103-147.75.203.55:22-139.178.89.65:54474.service - OpenSSH per-connection server daemon (139.178.89.65:54474). Jul 2 07:18:18.657109 systemd-logind[1661]: Removed session 102. Jul 2 07:18:18.685087 sshd[3244]: Accepted publickey for core from 139.178.89.65 port 54474 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:18:18.686013 sshd[3244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:18:18.689371 systemd-logind[1661]: New session 103 of user core. Jul 2 07:18:18.699899 systemd[1]: Started session-103.scope - Session 103 of User core. Jul 2 07:18:18.757196 sshd[3244]: pam_unix(sshd:session): session closed for user core Jul 2 07:18:18.766099 systemd[1]: sshd@103-147.75.203.55:22-139.178.89.65:54474.service: Deactivated successfully. Jul 2 07:18:18.766453 systemd[1]: session-103.scope: Deactivated successfully. Jul 2 07:18:18.766860 systemd-logind[1661]: Session 103 logged out. Waiting for processes to exit. Jul 2 07:18:18.767545 systemd[1]: Started sshd@104-147.75.203.55:22-139.178.89.65:54490.service - OpenSSH per-connection server daemon (139.178.89.65:54490). Jul 2 07:18:18.768161 systemd-logind[1661]: Removed session 103. Jul 2 07:18:18.797274 sshd[3251]: Accepted publickey for core from 139.178.89.65 port 54490 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:18:18.800534 sshd[3251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:18:18.811497 systemd-logind[1661]: New session 104 of user core. Jul 2 07:18:18.822059 systemd[1]: Started session-104.scope - Session 104 of User core. Jul 2 07:18:18.905626 sshd[3251]: pam_unix(sshd:session): session closed for user core Jul 2 07:18:18.923932 systemd[1]: sshd@104-147.75.203.55:22-139.178.89.65:54490.service: Deactivated successfully. Jul 2 07:18:18.925627 systemd[1]: session-104.scope: Deactivated successfully. Jul 2 07:18:18.927368 systemd-logind[1661]: Session 104 logged out. Waiting for processes to exit. Jul 2 07:18:18.930639 systemd[1]: Started sshd@105-147.75.203.55:22-139.178.89.65:54496.service - OpenSSH per-connection server daemon (139.178.89.65:54496). Jul 2 07:18:18.933233 systemd-logind[1661]: Removed session 104. Jul 2 07:18:18.985451 sshd[3258]: Accepted publickey for core from 139.178.89.65 port 54496 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:18:18.986070 sshd[3258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:18:18.988393 systemd-logind[1661]: New session 105 of user core. Jul 2 07:18:18.996843 systemd[1]: Started session-105.scope - Session 105 of User core. Jul 2 07:18:19.073704 sudo[3261]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:18:19.074852 sudo[3261]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:18:19.108218 sudo[3261]: pam_unix(sudo:session): session closed for user root Jul 2 07:18:19.111969 sshd[3258]: pam_unix(sshd:session): session closed for user core Jul 2 07:18:19.135052 systemd[1]: sshd@105-147.75.203.55:22-139.178.89.65:54496.service: Deactivated successfully. Jul 2 07:18:19.136783 systemd[1]: session-105.scope: Deactivated successfully. Jul 2 07:18:19.138629 systemd-logind[1661]: Session 105 logged out. Waiting for processes to exit. Jul 2 07:18:19.142025 systemd[1]: Started sshd@106-147.75.203.55:22-139.178.89.65:54502.service - OpenSSH per-connection server daemon (139.178.89.65:54502). Jul 2 07:18:19.144650 systemd-logind[1661]: Removed session 105. Jul 2 07:18:19.213437 sshd[3265]: Accepted publickey for core from 139.178.89.65 port 54502 ssh2: RSA SHA256:cKhHZbCRQEngOHe80ZThtJhITFMBe3DeQeV2Dxvu40Q Jul 2 07:18:19.216853 sshd[3265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:18:19.227856 systemd-logind[1661]: New session 106 of user core. Jul 2 07:18:19.241051 systemd[1]: Started session-106.scope - Session 106 of User core. Jul 2 07:18:19.323272 sudo[3269]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:18:19.324385 sudo[3269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:18:19.332983 sudo[3269]: pam_unix(sudo:session): session closed for user root Jul 2 07:18:19.347290 sudo[3268]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:18:19.348058 sudo[3268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:18:19.381521 systemd[1]: Stopping audit-rules.service - Load Security Auditing Rules... Jul 2 07:18:19.382000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:18:19.384917 auditctl[3272]: No rules Jul 2 07:18:19.385875 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:18:19.386381 systemd[1]: Stopped audit-rules.service - Load Security Auditing Rules. Jul 2 07:18:19.389788 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 2 07:18:19.389988 kernel: audit: type=1305 audit(1719904699.382:182): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:18:19.391069 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Jul 2 07:18:19.382000 audit[3272]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe964c0730 a2=420 a3=0 items=0 ppid=1 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:19.430397 augenrules[3289]: No rules Jul 2 07:18:19.431036 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Jul 2 07:18:19.431807 sudo[3268]: pam_unix(sudo:session): session closed for user root Jul 2 07:18:19.432874 sshd[3265]: pam_unix(sshd:session): session closed for user core Jul 2 07:18:19.434799 systemd[1]: sshd@106-147.75.203.55:22-139.178.89.65:54502.service: Deactivated successfully. Jul 2 07:18:19.435348 systemd[1]: session-106.scope: Deactivated successfully. Jul 2 07:18:19.435902 systemd-logind[1661]: Session 106 logged out. Waiting for processes to exit. Jul 2 07:18:19.436170 kernel: audit: type=1300 audit(1719904699.382:182): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe964c0730 a2=420 a3=0 items=0 ppid=1 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:19.436532 systemd-logind[1661]: Removed session 106. Jul 2 07:18:19.382000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:18:19.446610 kernel: audit: type=1327 audit(1719904699.382:182): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:18:19.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:19.468519 kernel: audit: type=1131 audit(1719904699.384:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:19.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:19.490967 kernel: audit: type=1130 audit(1719904699.429:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:19.430000 audit[3268]: USER_END pid=3268 uid=500 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:18:19.516974 kernel: audit: type=1106 audit(1719904699.430:185): pid=3268 uid=500 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:18:19.430000 audit[3268]: CRED_DISP pid=3268 uid=500 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:18:19.540785 kernel: audit: type=1104 audit(1719904699.430:186): pid=3268 uid=500 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:18:19.432000 audit[3265]: USER_END pid=3265 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:18:19.572642 kernel: audit: type=1106 audit(1719904699.432:187): pid=3265 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:18:19.432000 audit[3265]: CRED_DISP pid=3265 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:18:19.598886 kernel: audit: type=1104 audit(1719904699.432:188): pid=3265 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:18:19.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.203.55:22-139.178.89.65:54502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:19.624429 kernel: audit: type=1131 audit(1719904699.433:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.203.55:22-139.178.89.65:54502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:22.840311 systemd[1]: flanneld.service: Scheduled restart job, restart counter is at 1. Jul 2 07:18:22.842065 systemd[1]: etcd-member.service: Scheduled restart job, restart counter is at 1. Jul 2 07:18:22.852931 systemd[1]: Stopping flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)... Jul 2 07:18:22.860058 docker[3294]: flannel-docker-opts Jul 2 07:18:22.871184 docker[3301]: flannel-docker-opts Jul 2 07:18:22.871825 systemd[1]: flannel-docker-opts.service: Deactivated successfully. Jul 2 07:18:22.871976 systemd[1]: Stopped flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container). Jul 2 07:18:22.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flannel-docker-opts comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:22.872212 systemd[1]: Stopped flanneld.service - flannel - Network fabric for containers (System Application Container). Jul 2 07:18:22.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:22.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:22.872296 systemd[1]: Stopped etcd-member.service - etcd (System Application Container). Jul 2 07:18:22.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:22.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:22.873548 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Jul 2 07:18:22.889874 etcd-wrapper[3314]: Error response from daemon: No such container: etcd-member Jul 2 07:18:22.900364 etcd-wrapper[3323]: Error response from daemon: No such container: etcd-member Jul 2 07:18:22.915744 systemd[1]: var-lib-docker-overlay2-4a3834e675c7b782b9ffe02f44232b55e7b65777f58861d43e0c5331e2195153\x2dinit-merged.mount: Deactivated successfully. Jul 2 07:18:22.968257 containerd[1669]: time="2024-07-02T07:18:22.968145311Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:18:22.968257 containerd[1669]: time="2024-07-02T07:18:22.968202674Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:22.968257 containerd[1669]: time="2024-07-02T07:18:22.968221510Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:18:22.968257 containerd[1669]: time="2024-07-02T07:18:22.968234011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:22.986851 systemd[1]: Started docker-e1b7138cf2503c535fcfdcd90c76f2b65ea6b6d5fb162057a84d737a8290384a.scope - libcontainer container e1b7138cf2503c535fcfdcd90c76f2b65ea6b6d5fb162057a84d737a8290384a. Jul 2 07:18:22.991000 audit: BPF prog-id=51 op=LOAD Jul 2 07:18:22.991000 audit: BPF prog-id=52 op=LOAD Jul 2 07:18:22.991000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00018d988 a2=78 a3=0 items=0 ppid=3361 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:22.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65316237313338636632353033633533356663666463643930 Jul 2 07:18:22.991000 audit: BPF prog-id=53 op=LOAD Jul 2 07:18:22.991000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00018d720 a2=78 a3=0 items=0 ppid=3361 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:22.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65316237313338636632353033633533356663666463643930 Jul 2 07:18:22.991000 audit: BPF prog-id=53 op=UNLOAD Jul 2 07:18:22.991000 audit: BPF prog-id=52 op=UNLOAD Jul 2 07:18:22.991000 audit: BPF prog-id=54 op=LOAD Jul 2 07:18:22.991000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00018dbe0 a2=78 a3=0 items=0 ppid=3361 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:22.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65316237313338636632353033633533356663666463643930 Jul 2 07:18:23.023244 etcd-wrapper[3343]: {"level":"info","ts":1719904703.0230873,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jul 2 07:18:23.023244 etcd-wrapper[3343]: {"level":"info","ts":1719904703.0231345,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"7fbb7fe2e6db47cc932d250109ba48dd"} Jul 2 07:18:23.023244 etcd-wrapper[3343]: {"level":"warn","ts":1719904703.0231555,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jul 2 07:18:23.023244 etcd-wrapper[3343]: {"level":"warn","ts":1719904703.0231683,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Jul 2 07:18:23.023244 etcd-wrapper[3343]: {"level":"warn","ts":1719904703.023174,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jul 2 07:18:23.023244 etcd-wrapper[3343]: {"level":"warn","ts":1719904703.0231776,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jul 2 07:18:23.023698 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.023Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.25:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.25:2380","--advertise-client-urls=http://10.67.80.25:2379","--discovery=https://discovery.etcd.io/c7ddb73f7224e967ffe36df0a95559a7","--enable-v2=true"]} Jul 2 07:18:23.023698 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.023Z","caller":"etcdmain/etcd.go:115","msg":"server has been already initialized","data-dir":"/var/lib/etcd","dir-type":"member"} Jul 2 07:18:23.023698 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.023Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.25:2380"]} Jul 2 07:18:23.023698 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.023Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Jul 2 07:18:23.023923 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.023Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":true,"name":"7fbb7fe2e6db47cc932d250109ba48dd","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.25:2380"],"listen-peer-urls":["http://10.67.80.25:2380"],"advertise-client-urls":["http://10.67.80.25:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"","initial-cluster-state":"new","initial-cluster-token":"","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/c7ddb73f7224e967ffe36df0a95559a7","discovery-proxy":"","downgrade-check-interval":"5s"} Jul 2 07:18:23.024336 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"83.25µs"} Jul 2 07:18:23.024379 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:23.024Z","caller":"etcdserver/server.go:480","msg":"discovery token is ignored since cluster already initialized; valid logs are found","wal-dir":"/var/lib/etcd/member/wal"} Jul 2 07:18:23.024426 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","caller":"etcdserver/server.go:526","msg":"No snapshot found. Recovering WAL from scratch!"} Jul 2 07:18:23.024849 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","caller":"etcdserver/raft.go:483","msg":"restarting local member","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","commit-index":30} Jul 2 07:18:23.024849 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=()"} Jul 2 07:18:23.024849 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d became follower at term 2"} Jul 2 07:18:23.024849 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 31d2d136df99400d [peers: [], term: 2, commit: 30, applied: 0, lastindex: 30, lastterm: 2]"} Jul 2 07:18:23.024999 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Jul 2 07:18:23.024999 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","recovered-remote-peer-id":"31d2d136df99400d","recovered-remote-peer-urls":["http://10.67.80.25:2380"]} Jul 2 07:18:23.024999 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","recovered-remote-peer-id":"49c0c2e9597dd6c7","recovered-remote-peer-urls":["http://10.67.80.33:2380"]} Jul 2 07:18:23.024999 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","recovered-remote-peer-id":"53f55400f8b40367","recovered-remote-peer-urls":["http://10.67.80.31:2380"]} Jul 2 07:18:23.024999 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.024Z","caller":"membership/cluster.go:285","msg":"set cluster version from store","cluster-version":"3.5"} Jul 2 07:18:23.025256 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:23.025Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Jul 2 07:18:23.025927 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.025Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Jul 2 07:18:23.026196 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jul 2 07:18:23.026314 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.026314 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.026520 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.026595 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.026822 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.026822 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7","remote-peer-urls":["http://10.67.80.33:2380"]} Jul 2 07:18:23.026822 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:23.026822 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:23.026822 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.027021 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.026Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.027218 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.027Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:23.027504 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.027Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:23.028208 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:23.028208 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:23.028208 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367","remote-peer-urls":["http://10.67.80.31:2380"]} Jul 2 07:18:23.028208 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"53f55400f8b40367"} Jul 2 07:18:23.028208 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"etcdserver/server.go:834","msg":"starting etcd server","local-member-id":"31d2d136df99400d","local-server-version":"3.5.0","cluster-id":"8ba8b6bbc2ae7f2f","cluster-version":"3.5"} Jul 2 07:18:23.028454 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Jul 2 07:18:23.028454 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=(3590161886577508365)"} Jul 2 07:18:23.028454 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","added-peer-id":"31d2d136df99400d","added-peer-peer-urls":["http://10.67.80.25:2380"]} Jul 2 07:18:23.028454 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=(3590161886577508365 5314461867781772999)"} Jul 2 07:18:23.028454 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","added-peer-id":"49c0c2e9597dd6c7","added-peer-peer-urls":["http://10.67.80.33:2380"]} Jul 2 07:18:23.028638 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d switched to configuration voters=(3590161886577508365 5314461867781772999 6049834037591409511)"} Jul 2 07:18:23.028638 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","added-peer-id":"53f55400f8b40367","added-peer-peer-urls":["http://10.67.80.31:2380"]} Jul 2 07:18:23.028638 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.028Z","caller":"membership/cluster.go:523","msg":"updated cluster version","cluster-id":"8ba8b6bbc2ae7f2f","local-member-id":"31d2d136df99400d","from":"3.5","to":"3.5"} Jul 2 07:18:23.029419 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:23.029Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Jul 2 07:18:23.029486 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.029Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"31d2d136df99400d","initial-advertise-peer-urls":["http://10.67.80.25:2380"],"listen-peer-urls":["http://10.67.80.25:2380"],"advertise-client-urls":["http://10.67.80.25:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Jul 2 07:18:23.029486 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.029Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.25:2380"} Jul 2 07:18:23.029486 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.029Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.25:2380"} Jul 2 07:18:23.165167 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.164Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"31d2d136df99400d","to":"49c0c2e9597dd6c7","stream-type":"stream Message"} Jul 2 07:18:23.165167 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.164Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.165167 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.164Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.165167 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.164Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"31d2d136df99400d","to":"49c0c2e9597dd6c7","stream-type":"stream MsgApp v2"} Jul 2 07:18:23.165167 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.164Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.230412 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.229Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:23.230412 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:23.229Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"31d2d136df99400d","remote-peer-id":"49c0c2e9597dd6c7"} Jul 2 07:18:24.326095 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.325Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d is starting a new election at term 2"} Jul 2 07:18:24.326095 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.325Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d became pre-candidate at term 2"} Jul 2 07:18:24.326095 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.325Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d received MsgPreVoteResp from 31d2d136df99400d at term 2"} Jul 2 07:18:24.326095 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.325Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d [logterm: 2, index: 30] sent MsgPreVote request to 49c0c2e9597dd6c7 at term 2"} Jul 2 07:18:24.326095 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.325Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d [logterm: 2, index: 30] sent MsgPreVote request to 53f55400f8b40367 at term 2"} Jul 2 07:18:24.328140 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.326Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d [term: 2] received a MsgPreVoteResp message with higher term from 49c0c2e9597dd6c7 [term: 3]"} Jul 2 07:18:24.328140 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.326Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d became follower at term 3"} Jul 2 07:18:24.862921 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.862Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d [logterm: 2, index: 30, vote: 0] cast MsgPreVote for 49c0c2e9597dd6c7 [logterm: 2, index: 30] at term 3"} Jul 2 07:18:24.864789 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.864Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d [term: 3] received a MsgVote message with higher term from 49c0c2e9597dd6c7 [term: 4]"} Jul 2 07:18:24.864789 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.864Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d became follower at term 4"} Jul 2 07:18:24.864789 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.864Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"31d2d136df99400d [logterm: 2, index: 30, vote: 0] cast MsgVote for 49c0c2e9597dd6c7 [logterm: 2, index: 30] at term 4"} Jul 2 07:18:24.867348 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.866Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 31d2d136df99400d elected leader 49c0c2e9597dd6c7 at term 4"} Jul 2 07:18:24.870938 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.870Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"31d2d136df99400d","local-member-attributes":"{Name:7fbb7fe2e6db47cc932d250109ba48dd ClientURLs:[http://10.67.80.25:2379]}","request-path":"/0/members/31d2d136df99400d/attributes","cluster-id":"8ba8b6bbc2ae7f2f","publish-timeout":"7s"} Jul 2 07:18:24.870938 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.870Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jul 2 07:18:24.871442 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.870Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Jul 2 07:18:24.871442 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.871Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Jul 2 07:18:24.871492 systemd[1]: Started etcd-member.service - etcd (System Application Container). Jul 2 07:18:24.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:24.872752 etcd-wrapper[3343]: {"level":"info","ts":"2024-07-02T07:18:24.872Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Jul 2 07:18:24.877220 kernel: kauditd_printk_skb: 17 callbacks suppressed Jul 2 07:18:24.877254 kernel: audit: type=1130 audit(1719904704.870:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:24.931004 systemd[1]: Starting flanneld.service - flannel - Network fabric for containers (System Application Container)... Jul 2 07:18:26.944405 etcdctl[3408]: { "Network": "10.254.0.0/16", "Backend": {"Type": "vxlan"} } Jul 2 07:18:26.983932 flannel-wrapper[3419]: Error response from daemon: No such container: flannel Jul 2 07:18:26.991680 flannel-wrapper[3427]: Error response from daemon: No such container: flannel Jul 2 07:18:27.007124 systemd[1]: var-lib-docker-overlay2-5f645073b60857f1e7f9fc609511fe475e7997600b9184ba426301e93d3c1b28\x2dinit-merged.mount: Deactivated successfully. Jul 2 07:18:27.032930 containerd[1669]: time="2024-07-02T07:18:27.032871437Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:18:27.032930 containerd[1669]: time="2024-07-02T07:18:27.032913930Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:27.032930 containerd[1669]: time="2024-07-02T07:18:27.032928603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:18:27.033292 containerd[1669]: time="2024-07-02T07:18:27.032938994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:27.055830 systemd[1]: Started docker-a4a7a31c7a14ec1f4d1b426eca477f033a5e9728e9e3ecd81af06dc5b00b9784.scope - libcontainer container a4a7a31c7a14ec1f4d1b426eca477f033a5e9728e9e3ecd81af06dc5b00b9784. Jul 2 07:18:27.069000 audit: BPF prog-id=55 op=LOAD Jul 2 07:18:27.069000 audit[3469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000131988 a2=78 a3=0 items=0 ppid=3460 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:27.107132 flannel-wrapper[3443]: I0702 07:18:27.106943 1 main.go:520] Determining IP address of default interface Jul 2 07:18:27.107339 flannel-wrapper[3443]: I0702 07:18:27.107146 1 main.go:533] Using interface with name bond0 and address 147.75.203.55 Jul 2 07:18:27.107339 flannel-wrapper[3443]: I0702 07:18:27.107155 1 main.go:550] Defaulting external address to interface address (147.75.203.55) Jul 2 07:18:27.107339 flannel-wrapper[3443]: I0702 07:18:27.107207 1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: 10.254.75.0/24 Jul 2 07:18:27.107339 flannel-wrapper[3443]: I0702 07:18:27.107210 1 main.go:257] Installing signal handlers Jul 2 07:18:27.109026 flannel-wrapper[3443]: I0702 07:18:27.108971 1 main.go:392] Found network config - Backend type: vxlan Jul 2 07:18:27.109026 flannel-wrapper[3443]: I0702 07:18:27.108991 1 vxlan.go:123] VXLAN config: VNI=1 Port=0 GBP=false Learning=false DirectRouting=false Jul 2 07:18:27.111617 flannel-wrapper[3443]: I0702 07:18:27.111529 1 local_manager.go:147] Found lease (10.254.75.0/24) for current IP (147.75.203.55), reusing Jul 2 07:18:27.113103 flannel-wrapper[3443]: I0702 07:18:27.113039 1 main.go:307] Setting up masking rules Jul 2 07:18:27.119470 flannel-wrapper[3443]: I0702 07:18:27.119358 1 main.go:315] Changing default FORWARD chain policy to ACCEPT Jul 2 07:18:27.119516 flannel-wrapper[3443]: I0702 07:18:27.119415 1 main.go:323] Wrote subnet file to /run/flannel/subnet.env Jul 2 07:18:27.119516 flannel-wrapper[3443]: I0702 07:18:27.119421 1 main.go:327] Running backend. Jul 2 07:18:27.119594 flannel-wrapper[3443]: I0702 07:18:27.119496 1 vxlan_network.go:59] watching for new subnet leases Jul 2 07:18:27.119554 systemd[1]: Started flanneld.service - flannel - Network fabric for containers (System Application Container). Jul 2 07:18:27.121647 flannel-wrapper[3443]: I0702 07:18:27.121572 1 main.go:439] Waiting for 22h59m59.990068315s to renew lease Jul 2 07:18:27.124152 kernel: audit: type=1334 audit(1719904707.069:202): prog-id=55 op=LOAD Jul 2 07:18:27.124190 kernel: audit: type=1300 audit(1719904707.069:202): arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000131988 a2=78 a3=0 items=0 ppid=3460 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:27.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61346137613331633761313465633166346431623432366563 Jul 2 07:18:27.203032 kernel: audit: type=1327 audit(1719904707.069:202): proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61346137613331633761313465633166346431623432366563 Jul 2 07:18:27.069000 audit: BPF prog-id=56 op=LOAD Jul 2 07:18:27.262671 kernel: audit: type=1334 audit(1719904707.069:203): prog-id=56 op=LOAD Jul 2 07:18:27.069000 audit[3469]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000131720 a2=78 a3=0 items=0 ppid=3460 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:27.310060 kernel: audit: type=1300 audit(1719904707.069:203): arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000131720 a2=78 a3=0 items=0 ppid=3460 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:27.311904 systemd[1]: Starting flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)... Jul 2 07:18:27.313850 sh[3535]: + for try in 1 2 3 4 5 6 Jul 2 07:18:27.313850 sh[3535]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i Jul 2 07:18:27.322627 sh[3541]: Error response from daemon: No such container: flannel-docker-opts Jul 2 07:18:27.329264 sh[3549]: Error response from daemon: No such container: flannel-docker-opts Jul 2 07:18:27.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61346137613331633761313465633166346431623432366563 Jul 2 07:18:27.394867 kernel: audit: type=1327 audit(1719904707.069:203): proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61346137613331633761313465633166346431623432366563 Jul 2 07:18:27.069000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:18:27.454653 kernel: audit: type=1334 audit(1719904707.069:204): prog-id=56 op=UNLOAD Jul 2 07:18:27.069000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:18:27.487415 kernel: audit: type=1334 audit(1719904707.069:205): prog-id=55 op=UNLOAD Jul 2 07:18:27.069000 audit: BPF prog-id=57 op=LOAD Jul 2 07:18:27.513745 kernel: audit: type=1334 audit(1719904707.069:206): prog-id=57 op=LOAD Jul 2 07:18:27.520387 containerd[1669]: time="2024-07-02T07:18:27.520319221Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:18:27.520387 containerd[1669]: time="2024-07-02T07:18:27.520342812Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:27.520387 containerd[1669]: time="2024-07-02T07:18:27.520351116Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:18:27.520387 containerd[1669]: time="2024-07-02T07:18:27.520356949Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:18:27.526103 systemd[1]: Started docker-88527027d6191bd2d8b4d52f15efdcbe2bb5c2ddaeff8d21225af85452c8f624.scope - libcontainer container 88527027d6191bd2d8b4d52f15efdcbe2bb5c2ddaeff8d21225af85452c8f624. Jul 2 07:18:27.069000 audit[3469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000131be0 a2=78 a3=0 items=0 ppid=3460 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:27.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61346137613331633761313465633166346431623432366563 Jul 2 07:18:27.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:27.537000 audit: BPF prog-id=58 op=LOAD Jul 2 07:18:27.537000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00018d988 a2=78 a3=0 items=0 ppid=3574 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:27.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F38383532373032376436313931626432643862346435326631 Jul 2 07:18:27.537000 audit: BPF prog-id=59 op=LOAD Jul 2 07:18:27.537000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00018d720 a2=78 a3=0 items=0 ppid=3574 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:27.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F38383532373032376436313931626432643862346435326631 Jul 2 07:18:27.537000 audit: BPF prog-id=59 op=UNLOAD Jul 2 07:18:27.537000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:18:27.537000 audit: BPF prog-id=60 op=LOAD Jul 2 07:18:27.537000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00018dbe0 a2=78 a3=0 items=0 ppid=3574 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:18:27.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F38383532373032376436313931626432643862346435326631 Jul 2 07:18:27.546133 systemd[1]: docker-88527027d6191bd2d8b4d52f15efdcbe2bb5c2ddaeff8d21225af85452c8f624.scope: Deactivated successfully. Jul 2 07:18:27.555000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:18:27.581609 dockerd[3069]: time="2024-07-02T07:18:27.581457559Z" level=info msg="ignoring event" container=88527027d6191bd2d8b4d52f15efdcbe2bb5c2ddaeff8d21225af85452c8f624 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 07:18:27.582386 containerd[1669]: time="2024-07-02T07:18:27.581409870Z" level=info msg="shim disconnected" id=88527027d6191bd2d8b4d52f15efdcbe2bb5c2ddaeff8d21225af85452c8f624 namespace=moby Jul 2 07:18:27.582386 containerd[1669]: time="2024-07-02T07:18:27.581602127Z" level=warning msg="cleaning up after shim disconnected" id=88527027d6191bd2d8b4d52f15efdcbe2bb5c2ddaeff8d21225af85452c8f624 namespace=moby Jul 2 07:18:27.582386 containerd[1669]: time="2024-07-02T07:18:27.581646840Z" level=info msg="cleaning up dead shim" namespace=moby Jul 2 07:18:27.627677 sh[3535]: + break Jul 2 07:18:27.627677 sh[3535]: + '[' 1 '!=' fail ']' Jul 2 07:18:27.628993 systemd[1]: Finished flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container). Jul 2 07:18:27.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flannel-docker-opts comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:18:28.029437 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:28.029Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s"} Jul 2 07:18:28.029437 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:28.029Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s"} Jul 2 07:18:33.030003 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:33.029Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:33.030003 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:33.029Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:38.030997 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:38.030Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:38.030997 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:38.030Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:43.031228 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:43.030Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:43.031228 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:43.030Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:48.032153 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:48.031Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:48.032153 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:48.031Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:53.032721 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:53.032Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:53.032721 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:53.032Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:58.033151 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:58.032Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:18:58.033151 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:18:58.032Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:03.033692 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:03.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:03.033692 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:03.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:08.034229 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:08.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:08.034229 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:08.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:13.034422 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:13.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:13.034422 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:13.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:18.034955 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:18.034Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:18.034955 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:18.034Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:23.035723 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:23.035Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:23.035723 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:23.035Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:28.036634 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:28.036Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:28.036634 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:28.036Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:33.037338 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:33.036Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:33.037338 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:33.036Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:38.038376 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:38.037Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:38.038376 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:38.037Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:43.038763 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:43.038Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:43.038763 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:43.038Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:48.039053 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:48.038Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:48.039053 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:48.038Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:53.040039 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:53.039Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:53.040039 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:53.039Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:58.040489 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:58.039Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:19:58.040489 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:19:58.040Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:03.041515 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:03.040Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:03.041515 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:03.041Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:08.042625 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:08.042Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:08.042625 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:08.042Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:13.043643 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:13.042Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:13.043643 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:13.043Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:18.044479 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:18.043Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:18.044479 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:18.043Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:23.044399 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:23.044Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:23.044399 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:23.044Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:28.045802 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:28.045Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:28.045802 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:28.045Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:33.046624 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:33.046Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:33.046624 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:33.046Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:38.047816 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:38.047Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:38.047816 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:38.047Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:43.048859 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:43.048Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:43.048859 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:43.048Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:48.050034 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:48.049Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:48.050034 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:48.049Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:53.050527 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:53.049Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:53.050527 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:53.050Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:53.522638 update_engine[1665]: I0702 07:20:53.522516 1665 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Jul 2 07:20:53.522638 update_engine[1665]: I0702 07:20:53.522631 1665 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Jul 2 07:20:53.523632 update_engine[1665]: I0702 07:20:53.523006 1665 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Jul 2 07:20:53.524143 update_engine[1665]: I0702 07:20:53.524085 1665 omaha_request_params.cc:62] Current group set to stable Jul 2 07:20:53.524358 update_engine[1665]: I0702 07:20:53.524294 1665 update_attempter.cc:499] Already updated boot flags. Skipping. Jul 2 07:20:53.524358 update_engine[1665]: I0702 07:20:53.524310 1665 update_attempter.cc:643] Scheduling an action processor start. Jul 2 07:20:53.524358 update_engine[1665]: I0702 07:20:53.524345 1665 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 07:20:53.524698 update_engine[1665]: I0702 07:20:53.524415 1665 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Jul 2 07:20:53.524698 update_engine[1665]: I0702 07:20:53.524562 1665 omaha_request_action.cc:271] Posting an Omaha request to disabled Jul 2 07:20:53.524698 update_engine[1665]: I0702 07:20:53.524580 1665 omaha_request_action.cc:272] Request: Jul 2 07:20:53.524698 update_engine[1665]: Jul 2 07:20:53.524698 update_engine[1665]: Jul 2 07:20:53.524698 update_engine[1665]: Jul 2 07:20:53.524698 update_engine[1665]: Jul 2 07:20:53.524698 update_engine[1665]: Jul 2 07:20:53.524698 update_engine[1665]: Jul 2 07:20:53.524698 update_engine[1665]: Jul 2 07:20:53.524698 update_engine[1665]: Jul 2 07:20:53.524698 update_engine[1665]: I0702 07:20:53.524609 1665 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:20:53.525785 locksmithd[1688]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Jul 2 07:20:53.527322 update_engine[1665]: I0702 07:20:53.527287 1665 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:20:53.527372 update_engine[1665]: E0702 07:20:53.527361 1665 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:20:53.527447 update_engine[1665]: I0702 07:20:53.527412 1665 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Jul 2 07:20:58.051491 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:58.050Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:20:58.051491 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:20:58.050Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:03.052170 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:03.051Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:03.052170 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:03.051Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:03.515911 update_engine[1665]: I0702 07:21:03.515784 1665 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:21:03.516753 update_engine[1665]: I0702 07:21:03.516320 1665 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:21:03.516753 update_engine[1665]: E0702 07:21:03.516543 1665 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:21:03.516973 update_engine[1665]: I0702 07:21:03.516830 1665 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Jul 2 07:21:08.053141 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:08.052Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:08.053141 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:08.052Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:13.054105 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:13.053Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:13.054105 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:13.053Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:13.515407 update_engine[1665]: I0702 07:21:13.515285 1665 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:21:13.516250 update_engine[1665]: I0702 07:21:13.515861 1665 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:21:13.516250 update_engine[1665]: E0702 07:21:13.516085 1665 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:21:13.516476 update_engine[1665]: I0702 07:21:13.516340 1665 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Jul 2 07:21:18.054314 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:18.053Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:18.054314 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:18.053Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:23.054825 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:23.054Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:23.054825 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:23.054Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:23.515842 update_engine[1665]: I0702 07:21:23.515720 1665 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:21:23.516705 update_engine[1665]: I0702 07:21:23.516254 1665 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:21:23.516705 update_engine[1665]: E0702 07:21:23.516485 1665 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:21:23.516958 update_engine[1665]: I0702 07:21:23.516760 1665 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 07:21:23.516958 update_engine[1665]: I0702 07:21:23.516780 1665 omaha_request_action.cc:617] Omaha request response: Jul 2 07:21:23.516958 update_engine[1665]: E0702 07:21:23.516927 1665 omaha_request_action.cc:636] Omaha request network transfer failed. Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.516966 1665 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.516978 1665 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.516985 1665 update_attempter.cc:306] Processing Done. Jul 2 07:21:23.517252 update_engine[1665]: E0702 07:21:23.517014 1665 update_attempter.cc:619] Update failed. Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.517021 1665 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.517030 1665 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.517040 1665 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.517195 1665 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.517241 1665 omaha_request_action.cc:271] Posting an Omaha request to disabled Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.517251 1665 omaha_request_action.cc:272] Request: Jul 2 07:21:23.517252 update_engine[1665]: Jul 2 07:21:23.517252 update_engine[1665]: Jul 2 07:21:23.517252 update_engine[1665]: Jul 2 07:21:23.517252 update_engine[1665]: Jul 2 07:21:23.517252 update_engine[1665]: Jul 2 07:21:23.517252 update_engine[1665]: Jul 2 07:21:23.517252 update_engine[1665]: I0702 07:21:23.517262 1665 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 07:21:23.518849 update_engine[1665]: I0702 07:21:23.517637 1665 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 07:21:23.518849 update_engine[1665]: E0702 07:21:23.517814 1665 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 07:21:23.518849 update_engine[1665]: I0702 07:21:23.518025 1665 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 07:21:23.518849 update_engine[1665]: I0702 07:21:23.518040 1665 omaha_request_action.cc:617] Omaha request response: Jul 2 07:21:23.518849 update_engine[1665]: I0702 07:21:23.518051 1665 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 07:21:23.518849 update_engine[1665]: I0702 07:21:23.518060 1665 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 07:21:23.518849 update_engine[1665]: I0702 07:21:23.518067 1665 update_attempter.cc:306] Processing Done. Jul 2 07:21:23.518849 update_engine[1665]: I0702 07:21:23.518075 1665 update_attempter.cc:310] Error event sent. Jul 2 07:21:23.518849 update_engine[1665]: I0702 07:21:23.518095 1665 update_check_scheduler.cc:74] Next update check in 49m1s Jul 2 07:21:23.519682 locksmithd[1688]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Jul 2 07:21:23.519682 locksmithd[1688]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Jul 2 07:21:28.055679 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:28.055Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:28.055679 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:28.055Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:33.056526 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:33.055Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:33.056526 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:33.056Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:38.057541 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:38.056Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:38.057541 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:38.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:43.057879 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:43.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:43.057879 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:43.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:48.058481 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:48.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:48.058481 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:48.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:53.059267 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:53.058Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:53.059267 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:53.058Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:58.060485 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:58.059Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:21:58.060485 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:21:58.059Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:03.061223 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:03.060Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:03.061223 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:03.060Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:08.017962 systemd[1]: Started sshd@107-147.75.203.55:22-61.177.172.160:54549.service - OpenSSH per-connection server daemon (61.177.172.160:54549). Jul 2 07:22:08.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.203.55:22-61.177.172.160:54549 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:08.023402 kernel: kauditd_printk_skb: 16 callbacks suppressed Jul 2 07:22:08.023454 kernel: audit: type=1130 audit(1719904928.017:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.203.55:22-61.177.172.160:54549 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:08.061909 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:08.061Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:08.061909 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:08.061Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:09.175323 sshd[3926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:22:09.175000 audit[3926]: USER_AUTH pid=3926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:09.260652 kernel: audit: type=1100 audit(1719904929.175:216): pid=3926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:11.577099 sshd[3924]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:22:11.884081 sshd[3927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:22:11.883000 audit[3927]: USER_AUTH pid=3927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:11.969780 kernel: audit: type=1100 audit(1719904931.883:217): pid=3927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:13.062306 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:13.061Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:13.062306 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:13.061Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:13.557947 sshd[3924]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:22:13.865234 sshd[3934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:22:13.865000 audit[3934]: USER_AUTH pid=3934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:13.951785 kernel: audit: type=1100 audit(1719904933.865:218): pid=3934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:15.815402 sshd[3924]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:22:15.968154 sshd[3924]: Received disconnect from 61.177.172.160 port 54549:11: [preauth] Jul 2 07:22:15.968154 sshd[3924]: Disconnected from authenticating user root 61.177.172.160 port 54549 [preauth] Jul 2 07:22:15.968000 audit[3924]: USER_ERR pid=3924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:15.971541 systemd[1]: sshd@107-147.75.203.55:22-61.177.172.160:54549.service: Deactivated successfully. Jul 2 07:22:15.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.203.55:22-61.177.172.160:54549 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:16.078067 kernel: audit: type=1109 audit(1719904935.968:219): pid=3924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:16.078103 kernel: audit: type=1131 audit(1719904935.971:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.203.55:22-61.177.172.160:54549 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:16.157942 systemd[1]: Started sshd@108-147.75.203.55:22-61.177.172.160:45774.service - OpenSSH per-connection server daemon (61.177.172.160:45774). Jul 2 07:22:16.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.203.55:22-61.177.172.160:45774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:16.244793 kernel: audit: type=1130 audit(1719904936.157:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.203.55:22-61.177.172.160:45774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:17.264731 sshd[3939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:22:17.264000 audit[3939]: USER_AUTH pid=3939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:17.350878 kernel: audit: type=1100 audit(1719904937.264:222): pid=3939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:18.062722 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:18.062Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:18.062722 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:18.062Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:19.094652 sshd[3937]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:22:19.388105 sshd[3946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:22:19.387000 audit[3946]: ANOM_LOGIN_FAILURES pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:19.388549 sshd[3946]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jul 2 07:22:19.388000 audit[3946]: USER_AUTH pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:19.473481 kernel: audit: type=2100 audit(1719904939.387:223): pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:19.473527 kernel: audit: type=1100 audit(1719904939.388:224): pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:21.494198 sshd[3937]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:22:21.794053 sshd[3947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:22:21.793000 audit[3947]: USER_AUTH pid=3947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:21.881648 kernel: audit: type=1100 audit(1719904941.793:225): pid=3947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:23.063798 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:23.062Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:23.063798 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:23.062Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:24.174875 sshd[3937]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:22:24.681048 sshd[3937]: Received disconnect from 61.177.172.160 port 45774:11: [preauth] Jul 2 07:22:24.681048 sshd[3937]: Disconnected from authenticating user root 61.177.172.160 port 45774 [preauth] Jul 2 07:22:24.681000 audit[3937]: USER_ERR pid=3937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:24.684430 systemd[1]: sshd@108-147.75.203.55:22-61.177.172.160:45774.service: Deactivated successfully. Jul 2 07:22:24.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.203.55:22-61.177.172.160:45774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:24.791714 kernel: audit: type=1109 audit(1719904944.681:226): pid=3937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:24.791744 kernel: audit: type=1131 audit(1719904944.684:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.203.55:22-61.177.172.160:45774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:24.869764 systemd[1]: Started sshd@109-147.75.203.55:22-61.177.172.160:42291.service - OpenSSH per-connection server daemon (61.177.172.160:42291). Jul 2 07:22:24.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.203.55:22-61.177.172.160:42291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:24.959802 kernel: audit: type=1130 audit(1719904944.869:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.203.55:22-61.177.172.160:42291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:26.121543 sshd[3958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:22:26.121000 audit[3958]: USER_AUTH pid=3958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:26.211679 kernel: audit: type=1100 audit(1719904946.121:229): pid=3958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:28.051761 sshd[3956]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:22:28.064341 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:28.063Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:28.064341 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:28.063Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:28.388326 sshd[3966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:22:28.388000 audit[3966]: USER_AUTH pid=3966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:28.480778 kernel: audit: type=1100 audit(1719904948.388:230): pid=3966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:30.062042 sshd[3956]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:22:30.790054 sshd[3967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:22:30.789000 audit[3967]: USER_AUTH pid=3967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:30.883791 kernel: audit: type=1100 audit(1719904950.789:231): pid=3967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:32.404438 sshd[3956]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:22:32.572280 sshd[3956]: Received disconnect from 61.177.172.160 port 42291:11: [preauth] Jul 2 07:22:32.572280 sshd[3956]: Disconnected from authenticating user root 61.177.172.160 port 42291 [preauth] Jul 2 07:22:32.572000 audit[3956]: USER_ERR pid=3956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:32.575637 systemd[1]: sshd@109-147.75.203.55:22-61.177.172.160:42291.service: Deactivated successfully. Jul 2 07:22:32.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.203.55:22-61.177.172.160:42291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:32.689961 kernel: audit: type=1109 audit(1719904952.572:232): pid=3956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:22:32.689998 kernel: audit: type=1131 audit(1719904952.575:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.203.55:22-61.177.172.160:42291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:22:33.065504 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:33.064Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:33.065504 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:33.064Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:38.065994 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:38.065Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:38.065994 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:38.065Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:43.067025 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:43.066Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:43.067025 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:43.066Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:48.068231 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:48.067Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:48.068231 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:48.067Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:53.068715 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:53.068Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:53.068715 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:53.068Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:58.069620 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:58.068Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:22:58.069620 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:22:58.069Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:03.070550 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:03.069Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:03.070550 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:03.070Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:08.071443 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:08.070Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:08.071443 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:08.070Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:13.072455 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:13.071Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:13.072455 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:13.071Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:18.073701 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:18.072Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:18.073701 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:18.073Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:23.074413 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:23.073Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:23.074413 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:23.073Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:28.075003 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:28.074Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:28.075003 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:28.074Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:29.981289 systemd[1]: Started sshd@110-147.75.203.55:22-218.92.0.29:11290.service - OpenSSH per-connection server daemon (218.92.0.29:11290). Jul 2 07:23:29.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.203.55:22-218.92.0.29:11290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:30.074721 kernel: audit: type=1130 audit(1719905009.979:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.203.55:22-218.92.0.29:11290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:31.037360 sshd[4049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Jul 2 07:23:31.036000 audit[4049]: USER_AUTH pid=4049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:31.129652 kernel: audit: type=1100 audit(1719905011.036:235): pid=4049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:33.075730 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:33.075Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:33.075730 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:33.075Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:33.223635 sshd[4047]: PAM: Permission denied for root from 218.92.0.29 Jul 2 07:23:33.501850 sshd[4056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Jul 2 07:23:33.500000 audit[4056]: USER_AUTH pid=4056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:33.594779 kernel: audit: type=1100 audit(1719905013.500:236): pid=4056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:35.432235 sshd[4047]: PAM: Permission denied for root from 218.92.0.29 Jul 2 07:23:35.719779 sshd[4057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Jul 2 07:23:35.718000 audit[4057]: USER_AUTH pid=4057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:35.812779 kernel: audit: type=1100 audit(1719905015.718:237): pid=4057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:37.258539 sshd[4047]: PAM: Permission denied for root from 218.92.0.29 Jul 2 07:23:37.404582 sshd[4047]: Received disconnect from 218.92.0.29 port 11290:11: [preauth] Jul 2 07:23:37.404582 sshd[4047]: Disconnected from authenticating user root 218.92.0.29 port 11290 [preauth] Jul 2 07:23:37.403000 audit[4047]: USER_ERR pid=4047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:37.408054 systemd[1]: sshd@110-147.75.203.55:22-218.92.0.29:11290.service: Deactivated successfully. Jul 2 07:23:37.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.203.55:22-218.92.0.29:11290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:37.496703 kernel: audit: type=1109 audit(1719905017.403:238): pid=4047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:37.496725 kernel: audit: type=1131 audit(1719905017.407:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.203.55:22-218.92.0.29:11290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:37.607715 systemd[1]: Started sshd@111-147.75.203.55:22-218.92.0.29:53900.service - OpenSSH per-connection server daemon (218.92.0.29:53900). Jul 2 07:23:37.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.203.55:22-218.92.0.29:53900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:37.698617 kernel: audit: type=1130 audit(1719905017.606:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.203.55:22-218.92.0.29:53900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:38.076498 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:38.075Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:38.076498 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:38.075Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:38.779434 sshd[4068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Jul 2 07:23:38.778000 audit[4068]: USER_AUTH pid=4068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:38.871779 kernel: audit: type=1100 audit(1719905018.778:241): pid=4068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:41.065451 sshd[4062]: PAM: Permission denied for root from 218.92.0.29 Jul 2 07:23:41.374084 sshd[4069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Jul 2 07:23:41.372000 audit[4069]: USER_AUTH pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:41.466778 kernel: audit: type=1100 audit(1719905021.372:242): pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:43.076763 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:43.076Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:43.076763 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:43.076Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:43.404691 sshd[4062]: PAM: Permission denied for root from 218.92.0.29 Jul 2 07:23:43.717019 sshd[4076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Jul 2 07:23:43.716000 audit[4076]: USER_AUTH pid=4076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:43.809773 kernel: audit: type=1100 audit(1719905023.716:243): pid=4076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:45.687055 sshd[4062]: PAM: Permission denied for root from 218.92.0.29 Jul 2 07:23:46.210559 sshd[4062]: Received disconnect from 218.92.0.29 port 53900:11: [preauth] Jul 2 07:23:46.210559 sshd[4062]: Disconnected from authenticating user root 218.92.0.29 port 53900 [preauth] Jul 2 07:23:46.210000 audit[4062]: USER_ERR pid=4062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:46.214165 systemd[1]: sshd@111-147.75.203.55:22-218.92.0.29:53900.service: Deactivated successfully. Jul 2 07:23:46.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.203.55:22-218.92.0.29:53900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:46.326516 kernel: audit: type=1109 audit(1719905026.210:244): pid=4062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:46.326569 kernel: audit: type=1131 audit(1719905026.214:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.203.55:22-218.92.0.29:53900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:46.412518 systemd[1]: Started sshd@112-147.75.203.55:22-218.92.0.29:46999.service - OpenSSH per-connection server daemon (218.92.0.29:46999). Jul 2 07:23:46.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.203.55:22-218.92.0.29:46999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:46.505699 kernel: audit: type=1130 audit(1719905026.412:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.203.55:22-218.92.0.29:46999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:47.481076 sshd[4083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Jul 2 07:23:47.480000 audit[4083]: USER_AUTH pid=4083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:47.573783 kernel: audit: type=1100 audit(1719905027.480:247): pid=4083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:48.077694 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:48.077Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:48.077694 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:48.077Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:48.999915 sshd[4079]: PAM: Permission denied for root from 218.92.0.29 Jul 2 07:23:49.293524 sshd[4090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Jul 2 07:23:49.293000 audit[4090]: USER_AUTH pid=4090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:49.385775 kernel: audit: type=1100 audit(1719905029.293:248): pid=4090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:51.755730 sshd[4079]: PAM: Permission denied for root from 218.92.0.29 Jul 2 07:23:52.049427 sshd[4091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Jul 2 07:23:52.049000 audit[4091]: USER_AUTH pid=4091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:52.141751 kernel: audit: type=1100 audit(1719905032.049:249): pid=4091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:53.078200 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:53.077Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:53.078200 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:53.077Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:54.120073 sshd[4079]: PAM: Permission denied for root from 218.92.0.29 Jul 2 07:23:54.267707 sshd[4079]: Received disconnect from 218.92.0.29 port 46999:11: [preauth] Jul 2 07:23:54.267707 sshd[4079]: Disconnected from authenticating user root 218.92.0.29 port 46999 [preauth] Jul 2 07:23:54.267000 audit[4079]: USER_ERR pid=4079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:54.271143 systemd[1]: sshd@112-147.75.203.55:22-218.92.0.29:46999.service: Deactivated successfully. Jul 2 07:23:54.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.203.55:22-218.92.0.29:46999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:54.384213 kernel: audit: type=1109 audit(1719905034.267:250): pid=4079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Jul 2 07:23:54.384249 kernel: audit: type=1131 audit(1719905034.271:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.203.55:22-218.92.0.29:46999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:23:58.078452 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:58.077Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:23:58.078452 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:23:58.077Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:03.078695 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:03.078Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:03.078695 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:03.078Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:08.079549 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:08.078Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:08.079549 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:08.079Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:13.080697 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:13.080Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:13.080697 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:13.080Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:18.080931 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:18.080Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:18.080931 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:18.080Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:23.082441 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:23.081Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:23.082441 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:23.081Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:28.082768 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:28.082Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:28.082768 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:28.082Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:33.083451 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:33.082Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:33.083451 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:33.082Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:38.084046 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:38.083Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:38.084046 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:38.083Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:43.085103 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:43.084Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:43.085103 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:43.084Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:48.085997 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:48.085Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:48.085997 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:48.085Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:48.101997 systemd[1]: Starting systemd-tmpfiles-clean.service - Cleanup of Temporary Directories... Jul 2 07:24:48.115241 systemd-tmpfiles[4168]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:24:48.115456 systemd-tmpfiles[4168]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:24:48.115727 systemd-tmpfiles[4168]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Jul 2 07:24:48.116124 systemd-tmpfiles[4168]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:24:48.119765 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Jul 2 07:24:48.119858 systemd[1]: Finished systemd-tmpfiles-clean.service - Cleanup of Temporary Directories. Jul 2 07:24:48.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:24:48.120927 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Jul 2 07:24:48.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:24:48.231015 kernel: audit: type=1130 audit(1719905088.119:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:24:48.231048 kernel: audit: type=1131 audit(1719905088.119:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:24:53.086875 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:53.086Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:53.086875 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:53.086Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:58.087567 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:58.086Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:24:58.087567 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:24:58.086Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:03.088480 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:03.087Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:03.088480 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:03.087Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:08.089417 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:08.088Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:08.089417 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:08.088Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:13.090672 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:13.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:13.090672 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:13.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:18.091395 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:18.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:18.091395 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:18.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:23.092169 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:23.091Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:23.092169 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:23.091Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:28.093279 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:28.092Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:28.093279 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:28.092Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:33.094512 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:33.093Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:33.094512 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:33.093Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:38.094999 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:38.094Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:38.094999 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:38.094Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:43.096029 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:43.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:43.096029 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:43.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:48.097125 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:48.096Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:48.097125 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:48.096Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:53.098008 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:53.097Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:53.098008 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:53.097Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:58.098679 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:58.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:25:58.098679 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:25:58.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:03.099207 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:03.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:03.099207 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:03.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:08.100347 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:08.099Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:08.100347 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:08.099Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:11.466198 systemd[1]: Started sshd@113-147.75.203.55:22-61.177.172.136:48374.service - OpenSSH per-connection server daemon (61.177.172.136:48374). Jul 2 07:26:11.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.203.55:22-61.177.172.136:48374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:11.558798 kernel: audit: type=1130 audit(1719905171.465:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.203.55:22-61.177.172.136:48374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:13.100758 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:13.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:13.100758 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:13.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:18.101029 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:18.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:18.101029 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:18.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:20.549067 sshd[4282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Jul 2 07:26:20.548000 audit[4282]: USER_AUTH pid=4282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:20.641773 kernel: audit: type=1100 audit(1719905180.548:255): pid=4282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:22.936000 sshd[4268]: PAM: Permission denied for root from 61.177.172.136 Jul 2 07:26:23.102062 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:23.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:23.102062 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:23.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:25.986079 sshd[4289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Jul 2 07:26:25.985000 audit[4289]: USER_AUTH pid=4289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:26.078771 kernel: audit: type=1100 audit(1719905185.985:256): pid=4289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:27.589989 sshd[4268]: PAM: Permission denied for root from 61.177.172.136 Jul 2 07:26:28.103133 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:28.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:28.103133 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:28.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:31.036349 sshd[4296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Jul 2 07:26:31.036000 audit[4296]: USER_AUTH pid=4296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:31.129666 kernel: audit: type=1100 audit(1719905191.036:257): pid=4296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:33.104040 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:33.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:33.104040 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:33.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:33.266931 sshd[4268]: PAM: Permission denied for root from 61.177.172.136 Jul 2 07:26:33.928654 sshd[4268]: Received disconnect from 61.177.172.136 port 48374:11: [preauth] Jul 2 07:26:33.928654 sshd[4268]: Disconnected from authenticating user root 61.177.172.136 port 48374 [preauth] Jul 2 07:26:33.928000 audit[4268]: USER_ERR pid=4268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:33.932263 systemd[1]: sshd@113-147.75.203.55:22-61.177.172.136:48374.service: Deactivated successfully. Jul 2 07:26:33.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.203.55:22-61.177.172.136:48374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:34.045626 kernel: audit: type=1109 audit(1719905193.928:258): pid=4268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:34.045700 kernel: audit: type=1131 audit(1719905193.932:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.203.55:22-61.177.172.136:48374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:34.602410 systemd[1]: Started sshd@114-147.75.203.55:22-61.177.172.136:19770.service - OpenSSH per-connection server daemon (61.177.172.136:19770). Jul 2 07:26:34.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.203.55:22-61.177.172.136:19770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:34.694642 kernel: audit: type=1130 audit(1719905194.601:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.203.55:22-61.177.172.136:19770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:38.104328 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:38.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:38.104328 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:38.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:38.879033 sshd[4310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Jul 2 07:26:38.878000 audit[4310]: USER_AUTH pid=4310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:38.971775 kernel: audit: type=1100 audit(1719905198.878:261): pid=4310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:41.541798 sshd[4305]: PAM: Permission denied for root from 61.177.172.136 Jul 2 07:26:42.824616 sshd[4314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Jul 2 07:26:42.824000 audit[4314]: ANOM_LOGIN_FAILURES pid=4314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:42.825010 sshd[4314]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jul 2 07:26:42.824000 audit[4314]: USER_AUTH pid=4314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:42.913866 kernel: audit: type=2100 audit(1719905202.824:262): pid=4314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:42.913899 kernel: audit: type=1100 audit(1719905202.824:263): pid=4314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:43.104346 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:43.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:43.104346 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:43.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:45.035812 sshd[4305]: PAM: Permission denied for root from 61.177.172.136 Jul 2 07:26:47.474387 sshd[4321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Jul 2 07:26:47.474000 audit[4321]: USER_AUTH pid=4321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:47.566784 kernel: audit: type=1100 audit(1719905207.474:264): pid=4321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:48.104871 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:48.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:48.104871 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:48.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:49.765742 sshd[4305]: PAM: Permission denied for root from 61.177.172.136 Jul 2 07:26:50.428634 sshd[4305]: Received disconnect from 61.177.172.136 port 19770:11: [preauth] Jul 2 07:26:50.428634 sshd[4305]: Disconnected from authenticating user root 61.177.172.136 port 19770 [preauth] Jul 2 07:26:50.428000 audit[4305]: USER_ERR pid=4305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:50.432022 systemd[1]: sshd@114-147.75.203.55:22-61.177.172.136:19770.service: Deactivated successfully. Jul 2 07:26:50.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.203.55:22-61.177.172.136:19770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:50.546307 kernel: audit: type=1109 audit(1719905210.428:265): pid=4305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:26:50.546338 kernel: audit: type=1131 audit(1719905210.431:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.203.55:22-61.177.172.136:19770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:52.078592 systemd[1]: Started sshd@115-147.75.203.55:22-61.177.172.136:29825.service - OpenSSH per-connection server daemon (61.177.172.136:29825). Jul 2 07:26:52.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.203.55:22-61.177.172.136:29825 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:52.172793 kernel: audit: type=1130 audit(1719905212.078:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.203.55:22-61.177.172.136:29825 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:26:53.105022 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:53.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:53.105022 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:53.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:58.105278 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:58.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:26:58.105278 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:26:58.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:03.105950 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:03.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:03.105950 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:03.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:04.041499 sshd[4344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Jul 2 07:27:04.041000 audit[4344]: USER_AUTH pid=4344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:27:04.134771 kernel: audit: type=1100 audit(1719905224.041:268): pid=4344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:27:05.585578 sshd[4330]: PAM: Permission denied for root from 61.177.172.136 Jul 2 07:27:06.892541 sshd[4351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Jul 2 07:27:06.892000 audit[4351]: USER_AUTH pid=4351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:27:06.984636 kernel: audit: type=1100 audit(1719905226.892:269): pid=4351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:27:08.106229 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:08.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:08.106229 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:08.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:08.732420 sshd[4330]: PAM: Permission denied for root from 61.177.172.136 Jul 2 07:27:12.350715 sshd[4358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Jul 2 07:27:12.350000 audit[4358]: USER_AUTH pid=4358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:27:12.443762 kernel: audit: type=1100 audit(1719905232.350:270): pid=4358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:27:13.106348 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:13.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:13.106348 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:13.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:14.602104 sshd[4330]: PAM: Permission denied for root from 61.177.172.136 Jul 2 07:27:15.289612 sshd[4330]: Received disconnect from 61.177.172.136 port 29825:11: [preauth] Jul 2 07:27:15.289612 sshd[4330]: Disconnected from authenticating user root 61.177.172.136 port 29825 [preauth] Jul 2 07:27:15.289000 audit[4330]: USER_ERR pid=4330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:27:15.292984 systemd[1]: sshd@115-147.75.203.55:22-61.177.172.136:29825.service: Deactivated successfully. Jul 2 07:27:15.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.203.55:22-61.177.172.136:29825 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:27:15.407734 kernel: audit: type=1109 audit(1719905235.289:271): pid=4330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Jul 2 07:27:15.407766 kernel: audit: type=1131 audit(1719905235.292:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.203.55:22-61.177.172.136:29825 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:27:18.106915 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:18.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:18.106915 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:18.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:23.107515 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:23.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:23.107515 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:23.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:28.108783 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:28.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:28.108783 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:28.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:33.109959 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:33.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:33.109959 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:33.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:38.110743 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:38.110Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:38.110743 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:38.110Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:43.111769 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:43.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:43.111769 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:43.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:48.112964 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:48.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:48.112964 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:48.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:53.113233 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:53.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:53.113233 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:53.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:58.114150 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:58.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:27:58.114150 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:27:58.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:03.115267 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:03.114Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:03.115267 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:03.114Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:08.115881 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:08.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:08.115881 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:08.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:13.116289 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:13.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:13.116289 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:13.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:18.117320 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:18.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:18.117320 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:18.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:23.118411 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:23.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:23.118411 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:23.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:28.118613 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:28.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:28.118613 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:28.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:33.118923 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:33.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:33.118923 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:33.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:38.119756 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:38.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:38.119756 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:38.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:43.120636 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:43.120Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:43.120636 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:43.120Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:48.121382 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:48.120Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:48.121382 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:48.120Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:53.121959 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:53.121Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:53.121959 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:53.121Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:58.122949 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:58.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:28:58.122949 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:28:58.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:03.123061 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:03.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:03.123061 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:03.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:08.124082 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:08.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:08.124082 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:08.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:13.124538 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:13.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:13.124538 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:13.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:18.124959 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:18.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:18.124959 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:18.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:23.125991 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:23.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:23.125991 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:23.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:28.126172 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:28.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:28.126172 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:28.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:33.126928 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:33.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:33.126928 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:33.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:33.869061 systemd[1]: Started sshd@116-147.75.203.55:22-218.92.0.31:55687.service - OpenSSH per-connection server daemon (218.92.0.31:55687). Jul 2 07:29:33.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.203.55:22-218.92.0.31:55687 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:33.962668 kernel: audit: type=1130 audit(1719905373.868:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.203.55:22-218.92.0.31:55687 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:35.016463 sshd[4540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Jul 2 07:29:35.016000 audit[4540]: USER_AUTH pid=4540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:35.109787 kernel: audit: type=1100 audit(1719905375.016:274): pid=4540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:36.841182 sshd[4538]: PAM: Permission denied for root from 218.92.0.31 Jul 2 07:29:37.507331 sshd[4541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Jul 2 07:29:37.507000 audit[4541]: USER_AUTH pid=4541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:37.600764 kernel: audit: type=1100 audit(1719905377.507:275): pid=4541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:38.128073 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:38.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:38.128073 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:38.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:39.743570 sshd[4538]: PAM: Permission denied for root from 218.92.0.31 Jul 2 07:29:40.040561 sshd[4548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Jul 2 07:29:40.040000 audit[4548]: USER_AUTH pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:40.133779 kernel: audit: type=1100 audit(1719905380.040:276): pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:42.216479 sshd[4538]: PAM: Permission denied for root from 218.92.0.31 Jul 2 07:29:42.371619 sshd[4538]: Received disconnect from 218.92.0.31 port 55687:11: [preauth] Jul 2 07:29:42.371619 sshd[4538]: Disconnected from authenticating user root 218.92.0.31 port 55687 [preauth] Jul 2 07:29:42.371000 audit[4538]: USER_ERR pid=4538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:42.375000 systemd[1]: sshd@116-147.75.203.55:22-218.92.0.31:55687.service: Deactivated successfully. Jul 2 07:29:42.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.203.55:22-218.92.0.31:55687 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:42.464622 kernel: audit: type=1109 audit(1719905382.371:277): pid=4538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:42.464683 kernel: audit: type=1131 audit(1719905382.374:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.203.55:22-218.92.0.31:55687 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:42.566643 systemd[1]: Started sshd@117-147.75.203.55:22-218.92.0.31:57376.service - OpenSSH per-connection server daemon (218.92.0.31:57376). Jul 2 07:29:42.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.203.55:22-218.92.0.31:57376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:42.659799 kernel: audit: type=1130 audit(1719905382.566:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.203.55:22-218.92.0.31:57376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:43.128541 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:43.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:43.128541 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:43.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:43.626216 sshd[4557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Jul 2 07:29:43.626000 audit[4557]: USER_AUTH pid=4557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:43.719789 kernel: audit: type=1100 audit(1719905383.626:280): pid=4557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:45.686532 sshd[4552]: PAM: Permission denied for root from 218.92.0.31 Jul 2 07:29:45.975215 sshd[4562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Jul 2 07:29:45.974000 audit[4562]: ANOM_LOGIN_FAILURES pid=4562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:45.975631 sshd[4562]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jul 2 07:29:45.975000 audit[4562]: USER_AUTH pid=4562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:46.064935 kernel: audit: type=2100 audit(1719905385.974:281): pid=4562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:46.064966 kernel: audit: type=1100 audit(1719905385.975:282): pid=4562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:47.975883 sshd[4552]: PAM: Permission denied for root from 218.92.0.31 Jul 2 07:29:48.128752 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:48.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:48.128752 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:48.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:48.265837 sshd[4565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Jul 2 07:29:48.265000 audit[4565]: USER_AUTH pid=4565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:48.358788 kernel: audit: type=1100 audit(1719905388.265:283): pid=4565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:50.009640 sshd[4552]: PAM: Permission denied for root from 218.92.0.31 Jul 2 07:29:50.153429 sshd[4552]: Received disconnect from 218.92.0.31 port 57376:11: [preauth] Jul 2 07:29:50.153429 sshd[4552]: Disconnected from authenticating user root 218.92.0.31 port 57376 [preauth] Jul 2 07:29:50.153000 audit[4552]: USER_ERR pid=4552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:50.156830 systemd[1]: sshd@117-147.75.203.55:22-218.92.0.31:57376.service: Deactivated successfully. Jul 2 07:29:50.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.203.55:22-218.92.0.31:57376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:50.269340 kernel: audit: type=1109 audit(1719905390.153:284): pid=4552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:50.269372 kernel: audit: type=1131 audit(1719905390.156:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.203.55:22-218.92.0.31:57376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:50.353506 systemd[1]: Started sshd@118-147.75.203.55:22-218.92.0.31:45997.service - OpenSSH per-connection server daemon (218.92.0.31:45997). Jul 2 07:29:50.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.203.55:22-218.92.0.31:45997 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:50.446794 kernel: audit: type=1130 audit(1719905390.352:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.203.55:22-218.92.0.31:45997 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:51.499327 sshd[4576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Jul 2 07:29:51.499000 audit[4576]: USER_AUTH pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:51.591637 kernel: audit: type=1100 audit(1719905391.499:287): pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:53.129467 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:53.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:53.129467 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:53.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:53.655568 sshd[4573]: PAM: Permission denied for root from 218.92.0.31 Jul 2 07:29:53.986298 sshd[4583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Jul 2 07:29:53.986000 audit[4583]: USER_AUTH pid=4583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:54.078779 kernel: audit: type=1100 audit(1719905393.986:288): pid=4583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:56.086769 sshd[4573]: PAM: Permission denied for root from 218.92.0.31 Jul 2 07:29:56.407800 sshd[4584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Jul 2 07:29:56.407000 audit[4584]: USER_AUTH pid=4584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:56.500781 kernel: audit: type=1100 audit(1719905396.407:289): pid=4584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:58.130561 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:58.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:58.130561 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:29:58.130Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:29:58.252619 sshd[4573]: PAM: Permission denied for root from 218.92.0.31 Jul 2 07:29:58.417134 sshd[4573]: Received disconnect from 218.92.0.31 port 45997:11: [preauth] Jul 2 07:29:58.417134 sshd[4573]: Disconnected from authenticating user root 218.92.0.31 port 45997 [preauth] Jul 2 07:29:58.417000 audit[4573]: USER_ERR pid=4573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:58.420417 systemd[1]: sshd@118-147.75.203.55:22-218.92.0.31:45997.service: Deactivated successfully. Jul 2 07:29:58.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.203.55:22-218.92.0.31:45997 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:29:58.533252 kernel: audit: type=1109 audit(1719905398.417:290): pid=4573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Jul 2 07:29:58.533285 kernel: audit: type=1131 audit(1719905398.420:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.203.55:22-218.92.0.31:45997 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:30:03.131681 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:03.131Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:03.131681 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:03.131Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:08.132554 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:08.131Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:08.132554 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:08.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:13.132740 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:13.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:13.132740 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:13.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:18.133897 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:18.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:18.133897 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:18.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:23.134367 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:23.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:23.134367 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:23.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:28.135414 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:28.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:28.135414 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:28.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:33.136220 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:33.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:33.136220 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:33.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:38.136896 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:38.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:38.136896 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:38.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:43.137081 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:43.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:43.137081 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:43.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:48.137928 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:48.137Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:48.137928 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:48.137Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:53.138914 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:53.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:53.138914 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:53.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:58.139532 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:58.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:30:58.139532 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:30:58.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:03.140349 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:03.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:03.140349 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:03.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:08.141115 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:08.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:08.141115 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:08.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:13.141883 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:13.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:13.141883 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:13.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:18.142502 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:18.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:18.142502 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:18.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:23.143557 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:23.142Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:23.143557 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:23.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:28.143883 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:28.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:28.143883 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:28.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:33.144818 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:33.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:33.144818 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:33.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:38.145560 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:38.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:38.145560 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:38.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:43.145814 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:43.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:43.145814 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:43.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:48.146614 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:48.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:48.146614 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:48.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:53.147467 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:53.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:53.147467 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:53.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:58.147691 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:58.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:31:58.147691 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:31:58.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:03.148184 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:03.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:03.148184 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:03.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:08.149176 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:08.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:08.149176 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:08.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:13.150301 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:13.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:13.150301 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:13.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:18.150840 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:18.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:18.150840 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:18.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:20.830019 systemd[1]: Started sshd@119-147.75.203.55:22-218.92.0.107:60954.service - OpenSSH per-connection server daemon (218.92.0.107:60954). Jul 2 07:32:20.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.203.55:22-218.92.0.107:60954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:20.923793 kernel: audit: type=1130 audit(1719905540.828:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.203.55:22-218.92.0.107:60954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:21.906776 sshd[4765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Jul 2 07:32:21.905000 audit[4765]: USER_AUTH pid=4765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:21.999781 kernel: audit: type=1100 audit(1719905541.905:293): pid=4765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:23.151423 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:23.151Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:23.151423 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:23.151Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:24.323451 sshd[4763]: PAM: Permission denied for root from 218.92.0.107 Jul 2 07:32:24.607772 sshd[4772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Jul 2 07:32:24.606000 audit[4772]: USER_AUTH pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:24.700788 kernel: audit: type=1100 audit(1719905544.606:294): pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:26.768765 sshd[4763]: PAM: Permission denied for root from 218.92.0.107 Jul 2 07:32:27.053020 sshd[4773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Jul 2 07:32:27.051000 audit[4773]: USER_AUTH pid=4773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:27.145677 kernel: audit: type=1100 audit(1719905547.051:295): pid=4773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:28.152834 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:28.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:28.152834 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:28.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:28.822743 sshd[4763]: PAM: Permission denied for root from 218.92.0.107 Jul 2 07:32:28.964183 sshd[4763]: Received disconnect from 218.92.0.107 port 60954:11: [preauth] Jul 2 07:32:28.964183 sshd[4763]: Disconnected from authenticating user root 218.92.0.107 port 60954 [preauth] Jul 2 07:32:28.963000 audit[4763]: USER_ERR pid=4763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:28.967469 systemd[1]: sshd@119-147.75.203.55:22-218.92.0.107:60954.service: Deactivated successfully. Jul 2 07:32:28.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.203.55:22-218.92.0.107:60954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:29.080271 kernel: audit: type=1109 audit(1719905548.963:296): pid=4763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:29.080304 kernel: audit: type=1131 audit(1719905548.966:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.203.55:22-218.92.0.107:60954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:30.182742 systemd[1]: Started sshd@120-147.75.203.55:22-218.92.0.107:56147.service - OpenSSH per-connection server daemon (218.92.0.107:56147). Jul 2 07:32:30.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.203.55:22-218.92.0.107:56147 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:30.276793 kernel: audit: type=1130 audit(1719905550.181:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.203.55:22-218.92.0.107:56147 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:33.153132 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:33.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:33.153132 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:33.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:38.153989 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:38.153Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:38.153989 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:38.153Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:39.064747 sshd[4793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Jul 2 07:32:39.063000 audit[4793]: USER_AUTH pid=4793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:39.158799 kernel: audit: type=1100 audit(1719905559.063:299): pid=4793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:41.149937 sshd[4783]: PAM: Permission denied for root from 218.92.0.107 Jul 2 07:32:41.426001 sshd[4798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Jul 2 07:32:41.424000 audit[4798]: ANOM_LOGIN_FAILURES pid=4798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:41.426393 sshd[4798]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jul 2 07:32:41.425000 audit[4798]: USER_AUTH pid=4798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:41.515537 kernel: audit: type=2100 audit(1719905561.424:300): pid=4798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:41.515568 kernel: audit: type=1100 audit(1719905561.425:301): pid=4798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:43.155093 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:43.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:43.155093 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:43.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:43.255786 sshd[4783]: PAM: Permission denied for root from 218.92.0.107 Jul 2 07:32:43.533638 sshd[4801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Jul 2 07:32:43.532000 audit[4801]: USER_AUTH pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:43.626684 kernel: audit: type=1100 audit(1719905563.532:302): pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:45.970621 sshd[4783]: PAM: Permission denied for root from 218.92.0.107 Jul 2 07:32:46.116759 sshd[4783]: Received disconnect from 218.92.0.107 port 56147:11: [preauth] Jul 2 07:32:46.116759 sshd[4783]: Disconnected from authenticating user root 218.92.0.107 port 56147 [preauth] Jul 2 07:32:46.115000 audit[4783]: USER_ERR pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:46.120153 systemd[1]: sshd@120-147.75.203.55:22-218.92.0.107:56147.service: Deactivated successfully. Jul 2 07:32:46.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.203.55:22-218.92.0.107:56147 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:46.209653 kernel: audit: type=1109 audit(1719905566.115:303): pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:46.209697 kernel: audit: type=1131 audit(1719905566.118:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.203.55:22-218.92.0.107:56147 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:46.309573 systemd[1]: Started sshd@121-147.75.203.55:22-218.92.0.107:60281.service - OpenSSH per-connection server daemon (218.92.0.107:60281). Jul 2 07:32:46.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.203.55:22-218.92.0.107:60281 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:46.402659 kernel: audit: type=1130 audit(1719905566.308:305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.203.55:22-218.92.0.107:60281 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:47.394668 sshd[4810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Jul 2 07:32:47.393000 audit[4810]: USER_AUTH pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:47.487796 kernel: audit: type=1100 audit(1719905567.393:306): pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:48.155626 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:48.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:48.155626 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:48.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:49.379857 sshd[4808]: PAM: Permission denied for root from 218.92.0.107 Jul 2 07:32:49.664549 sshd[4817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Jul 2 07:32:49.663000 audit[4817]: USER_AUTH pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:49.756637 kernel: audit: type=1100 audit(1719905569.663:307): pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:51.257247 sshd[4808]: PAM: Permission denied for root from 218.92.0.107 Jul 2 07:32:51.560031 sshd[4818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Jul 2 07:32:51.558000 audit[4818]: USER_AUTH pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:51.652674 kernel: audit: type=1100 audit(1719905571.558:308): pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:53.155925 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:53.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:53.155925 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:53.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:53.761330 sshd[4808]: PAM: Permission denied for root from 218.92.0.107 Jul 2 07:32:53.903063 sshd[4808]: Received disconnect from 218.92.0.107 port 60281:11: [preauth] Jul 2 07:32:53.903063 sshd[4808]: Disconnected from authenticating user root 218.92.0.107 port 60281 [preauth] Jul 2 07:32:53.902000 audit[4808]: USER_ERR pid=4808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:53.906476 systemd[1]: sshd@121-147.75.203.55:22-218.92.0.107:60281.service: Deactivated successfully. Jul 2 07:32:53.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.203.55:22-218.92.0.107:60281 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:54.019682 kernel: audit: type=1109 audit(1719905573.902:309): pid=4808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Jul 2 07:32:54.019732 kernel: audit: type=1131 audit(1719905573.905:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.203.55:22-218.92.0.107:60281 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:32:58.156874 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:58.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:32:58.156874 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:32:58.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:03.158104 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:03.157Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:03.158104 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:03.157Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:08.159201 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:08.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:08.159201 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:08.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:13.159380 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:13.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:13.159380 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:13.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:18.160542 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:18.159Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:18.160542 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:18.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:23.161153 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:23.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:23.161153 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:23.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:28.161709 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:28.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:28.161709 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:28.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:33.162348 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:33.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:33.162348 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:33.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:38.163216 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:38.162Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:38.163216 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:38.162Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:43.163961 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:43.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:43.163961 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:43.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:48.164373 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:48.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:48.164373 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:48.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:53.165252 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:53.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:53.165252 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:53.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:58.165988 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:58.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:33:58.165988 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:33:58.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:03.167131 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:03.166Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:03.167131 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:03.166Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:08.167677 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:08.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:08.167677 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:08.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:13.167938 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:13.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:13.167938 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:13.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:18.168444 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:18.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:18.168444 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:18.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:23.168946 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:23.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:23.168946 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:23.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:28.169381 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:28.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:28.169381 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:28.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:33.169909 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:33.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:33.169909 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:33.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:38.170073 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:38.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:38.170073 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:38.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:43.170182 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:43.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:43.170182 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:43.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:48.170624 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:48.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:48.170624 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:48.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:53.170871 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:53.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:53.170871 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:53.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:58.172090 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:58.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:34:58.172090 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:34:58.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:03.172773 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:03.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:03.172773 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:03.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:08.173319 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:08.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:08.173319 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:08.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:13.174174 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:13.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:13.174174 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:13.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:18.175029 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:18.174Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:18.175029 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:18.174Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:23.176223 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:23.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:23.176223 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:23.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:28.177427 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:28.176Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:28.177427 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:28.176Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:33.178394 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:33.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:33.178394 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:33.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:38.179256 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:38.178Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:38.179256 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:38.178Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:43.179895 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:43.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:43.179895 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:43.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:48.179975 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:48.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:48.179975 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:48.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:53.180851 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:53.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:53.180851 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:53.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:58.181788 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:58.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:35:58.181788 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:35:58.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:03.182267 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:03.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:03.182267 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:03.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:08.183306 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:08.182Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:08.183306 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:08.182Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:13.184071 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:13.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:13.184071 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:13.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:18.184826 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:18.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:18.184826 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:18.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:23.185835 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:23.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:23.185835 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:23.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:28.186259 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:28.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:28.186259 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:28.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:33.186547 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:33.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:33.186547 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:33.186Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:38.187693 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:38.187Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:38.187693 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:38.187Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:43.188668 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:43.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:43.188668 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:43.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:48.188959 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:48.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:36:48.188959 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:48.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:36:53.189917 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:53.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:53.189917 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:53.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:36:58.191095 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:58.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:36:58.191095 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:36:58.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:37:03.191622 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:03.191Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:03.191622 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:03.191Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:08.192602 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:08.191Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:08.192602 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:08.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:13.193064 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:13.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:13.193064 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:13.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:18.194188 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:18.193Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:18.194188 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:18.193Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:23.194547 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:23.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:37:23.194547 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:23.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:37:28.195734 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:28.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:28.195734 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:28.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:33.196623 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:33.196Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:33.196623 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:33.196Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:38.197334 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:38.196Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:37:38.197334 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:38.196Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:37:43.198156 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:43.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:43.198156 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:43.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:48.199221 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:48.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:48.199221 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:48.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:53.199928 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:53.199Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:53.199928 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:53.199Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:37:58.200631 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:58.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:37:58.200631 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:37:58.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:03.200980 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:03.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:03.200980 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:03.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:08.201834 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:08.201Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:08.201834 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:08.201Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:13.202736 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:13.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:38:13.202736 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:13.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:18.203472 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:18.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:38:18.203472 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:18.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:38:23.204351 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:23.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:23.204351 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:23.204Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:38:28.205439 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:28.204Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:28.205439 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:28.204Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:33.205835 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:33.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:33.205835 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:33.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:38.206957 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:38.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:38.206957 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:38.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:43.207871 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:43.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:43.207871 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:43.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:48.208950 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:48.208Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:38:48.208950 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:48.208Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:38:53.210068 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:53.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:53.210068 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:53.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:58.210608 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:58.210Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:38:58.210608 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:38:58.210Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:03.211482 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:03.210Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:39:03.211482 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:03.210Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:39:08.212613 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:08.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:08.212613 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:08.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:11.215294 systemd[1]: Started sshd@122-147.75.203.55:22-218.92.0.76:16935.service - OpenSSH per-connection server daemon (218.92.0.76:16935). Jul 2 07:39:11.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.203.55:22-218.92.0.76:16935 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:11.308790 kernel: audit: type=1130 audit(1719905951.214:311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.203.55:22-218.92.0.76:16935 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:12.808636 sshd[5289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Jul 2 07:39:12.808000 audit[5289]: USER_AUTH pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:12.907777 kernel: audit: type=1100 audit(1719905952.808:312): pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:13.213844 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:13.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:13.213844 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:13.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:14.979057 sshd[5287]: PAM: Permission denied for root from 218.92.0.76 Jul 2 07:39:15.617935 sshd[5296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Jul 2 07:39:15.617000 audit[5296]: USER_AUTH pid=5296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:15.709638 kernel: audit: type=1100 audit(1719905955.617:313): pid=5296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:17.869209 sshd[5287]: PAM: Permission denied for root from 218.92.0.76 Jul 2 07:39:18.166735 sshd[5297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Jul 2 07:39:18.166000 audit[5297]: USER_AUTH pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:18.214008 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:18.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:39:18.214008 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:18.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:18.259786 kernel: audit: type=1100 audit(1719905958.166:314): pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:20.162021 sshd[5287]: PAM: Permission denied for root from 218.92.0.76 Jul 2 07:39:20.313671 sshd[5287]: Received disconnect from 218.92.0.76 port 16935:11: [preauth] Jul 2 07:39:20.313671 sshd[5287]: Disconnected from authenticating user root 218.92.0.76 port 16935 [preauth] Jul 2 07:39:20.313000 audit[5287]: USER_ERR pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:20.317045 systemd[1]: sshd@122-147.75.203.55:22-218.92.0.76:16935.service: Deactivated successfully. Jul 2 07:39:20.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.203.55:22-218.92.0.76:16935 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:20.430384 kernel: audit: type=1109 audit(1719905960.313:315): pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:20.430417 kernel: audit: type=1131 audit(1719905960.316:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.203.55:22-218.92.0.76:16935 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:20.508601 systemd[1]: Started sshd@123-147.75.203.55:22-218.92.0.76:18646.service - OpenSSH per-connection server daemon (218.92.0.76:18646). Jul 2 07:39:20.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.203.55:22-218.92.0.76:18646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:20.601795 kernel: audit: type=1130 audit(1719905960.508:317): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.203.55:22-218.92.0.76:18646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:21.542560 sshd[5309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Jul 2 07:39:21.542000 audit[5309]: USER_AUTH pid=5309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:21.635789 kernel: audit: type=1100 audit(1719905961.542:318): pid=5309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:23.214803 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:23.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:23.214803 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:23.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:23.949723 sshd[5307]: PAM: Permission denied for root from 218.92.0.76 Jul 2 07:39:24.228315 sshd[5312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Jul 2 07:39:24.228000 audit[5312]: ANOM_LOGIN_FAILURES pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:24.228729 sshd[5312]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jul 2 07:39:24.228000 audit[5312]: USER_AUTH pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:24.317725 kernel: audit: type=2100 audit(1719905964.228:319): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:24.317756 kernel: audit: type=1100 audit(1719905964.228:320): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:26.048309 sshd[5307]: PAM: Permission denied for root from 218.92.0.76 Jul 2 07:39:26.326677 sshd[5317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Jul 2 07:39:26.326000 audit[5317]: USER_AUTH pid=5317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:26.419786 kernel: audit: type=1100 audit(1719905966.326:321): pid=5317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:28.215530 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:28.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:28.215530 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:28.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:28.421922 sshd[5307]: PAM: Permission denied for root from 218.92.0.76 Jul 2 07:39:28.560225 sshd[5307]: Received disconnect from 218.92.0.76 port 18646:11: [preauth] Jul 2 07:39:28.560225 sshd[5307]: Disconnected from authenticating user root 218.92.0.76 port 18646 [preauth] Jul 2 07:39:28.560000 audit[5307]: USER_ERR pid=5307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:28.563680 systemd[1]: sshd@123-147.75.203.55:22-218.92.0.76:18646.service: Deactivated successfully. Jul 2 07:39:28.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.203.55:22-218.92.0.76:18646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:28.676714 kernel: audit: type=1109 audit(1719905968.560:322): pid=5307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:28.676746 kernel: audit: type=1131 audit(1719905968.563:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.203.55:22-218.92.0.76:18646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:28.756551 systemd[1]: Started sshd@124-147.75.203.55:22-218.92.0.76:12199.service - OpenSSH per-connection server daemon (218.92.0.76:12199). Jul 2 07:39:28.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.203.55:22-218.92.0.76:12199 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:28.847790 kernel: audit: type=1130 audit(1719905968.756:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.203.55:22-218.92.0.76:12199 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:29.758405 sshd[5325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Jul 2 07:39:29.758000 audit[5325]: USER_AUTH pid=5325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:29.850777 kernel: audit: type=1100 audit(1719905969.758:325): pid=5325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:30.930046 sshd[5321]: PAM: Permission denied for root from 218.92.0.76 Jul 2 07:39:31.205448 sshd[5330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Jul 2 07:39:31.205000 audit[5330]: USER_AUTH pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:31.297645 kernel: audit: type=1100 audit(1719905971.205:326): pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:33.216050 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:33.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:33.216050 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:33.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:33.652436 sshd[5321]: PAM: Permission denied for root from 218.92.0.76 Jul 2 07:39:33.925324 sshd[5331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Jul 2 07:39:33.925000 audit[5331]: USER_AUTH pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:34.017778 kernel: audit: type=1100 audit(1719905973.925:327): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:36.648372 sshd[5321]: PAM: Permission denied for root from 218.92.0.76 Jul 2 07:39:36.784328 sshd[5321]: Received disconnect from 218.92.0.76 port 12199:11: [preauth] Jul 2 07:39:36.784328 sshd[5321]: Disconnected from authenticating user root 218.92.0.76 port 12199 [preauth] Jul 2 07:39:36.784000 audit[5321]: USER_ERR pid=5321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:36.787747 systemd[1]: sshd@124-147.75.203.55:22-218.92.0.76:12199.service: Deactivated successfully. Jul 2 07:39:36.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.203.55:22-218.92.0.76:12199 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:36.900664 kernel: audit: type=1109 audit(1719905976.784:328): pid=5321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Jul 2 07:39:36.900711 kernel: audit: type=1131 audit(1719905976.787:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.203.55:22-218.92.0.76:12199 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:39:38.216368 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:38.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:38.216368 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:38.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:43.216725 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:43.216Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:39:43.216725 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:43.216Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:39:48.217713 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:48.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:39:48.217713 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:48.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:39:53.217927 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:53.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:53.217927 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:53.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: no route to host"} Jul 2 07:39:58.218416 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:58.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:39:58.218416 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:39:58.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:03.219286 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:03.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:03.219286 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:03.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:08.219744 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:08.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:08.219744 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:08.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:13.220142 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:13.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:13.220142 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:13.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:18.220835 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:18.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:18.220835 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:18.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:23.221125 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:23.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:23.221125 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:23.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: connect: connection refused"} Jul 2 07:40:28.222571 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:28.221Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:28.222571 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:28.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:33.222873 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:33.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:33.222873 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:33.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:38.223620 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:38.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:38.223620 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:38.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:42.351579 systemd[1]: Started sshd@125-147.75.203.55:22-61.177.172.160:30616.service - OpenSSH per-connection server daemon (61.177.172.160:30616). Jul 2 07:40:42.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.203.55:22-61.177.172.160:30616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:40:42.445791 kernel: audit: type=1130 audit(1719906042.350:330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.203.55:22-61.177.172.160:30616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:40:43.224105 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:43.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:43.224105 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:43.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:43.894366 sshd[5421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:40:43.893000 audit[5421]: USER_AUTH pid=5421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:43.987713 kernel: audit: type=1100 audit(1719906043.893:331): pid=5421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:45.894711 sshd[5419]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:40:46.196471 sshd[5428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:40:46.195000 audit[5428]: USER_AUTH pid=5428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:46.289794 kernel: audit: type=1100 audit(1719906046.195:332): pid=5428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:48.225246 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:48.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:48.225246 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:48.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:48.608329 sshd[5419]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:40:48.915095 sshd[5429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:40:48.914000 audit[5429]: USER_AUTH pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:49.008793 kernel: audit: type=1100 audit(1719906048.914:333): pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:50.599648 sshd[5419]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:40:50.749817 sshd[5419]: Received disconnect from 61.177.172.160 port 30616:11: [preauth] Jul 2 07:40:50.749817 sshd[5419]: Disconnected from authenticating user root 61.177.172.160 port 30616 [preauth] Jul 2 07:40:50.749000 audit[5419]: USER_ERR pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:50.753210 systemd[1]: sshd@125-147.75.203.55:22-61.177.172.160:30616.service: Deactivated successfully. Jul 2 07:40:50.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.203.55:22-61.177.172.160:30616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:40:50.866799 kernel: audit: type=1109 audit(1719906050.749:334): pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:50.866832 kernel: audit: type=1131 audit(1719906050.752:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.203.55:22-61.177.172.160:30616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:40:50.945230 systemd[1]: Started sshd@126-147.75.203.55:22-61.177.172.160:29443.service - OpenSSH per-connection server daemon (61.177.172.160:29443). Jul 2 07:40:50.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.203.55:22-61.177.172.160:29443 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:40:51.038779 kernel: audit: type=1130 audit(1719906050.943:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.203.55:22-61.177.172.160:29443 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:40:52.968342 sshd[5441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:40:52.967000 audit[5441]: USER_AUTH pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:53.060648 kernel: audit: type=1100 audit(1719906052.967:337): pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:53.225559 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:53.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:53.225559 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:53.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:55.204312 sshd[5438]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:40:55.517981 sshd[5448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:40:55.516000 audit[5448]: USER_AUTH pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:55.610781 kernel: audit: type=1100 audit(1719906055.516:338): pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:57.833797 sshd[5438]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:40:58.148145 sshd[5449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:40:58.147000 audit[5449]: USER_AUTH pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:58.226270 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:58.225Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:58.226270 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:40:58.226Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:40:58.240653 kernel: audit: type=1100 audit(1719906058.147:339): pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:59.736914 sshd[5438]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:40:59.892022 sshd[5438]: Received disconnect from 61.177.172.160 port 29443:11: [preauth] Jul 2 07:40:59.892022 sshd[5438]: Disconnected from authenticating user root 61.177.172.160 port 29443 [preauth] Jul 2 07:40:59.891000 audit[5438]: USER_ERR pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:40:59.895416 systemd[1]: sshd@126-147.75.203.55:22-61.177.172.160:29443.service: Deactivated successfully. Jul 2 07:40:59.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.203.55:22-61.177.172.160:29443 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:41:00.008851 kernel: audit: type=1109 audit(1719906059.891:340): pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:41:00.008884 kernel: audit: type=1131 audit(1719906059.894:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.203.55:22-61.177.172.160:29443 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:41:00.089871 systemd[1]: Started sshd@127-147.75.203.55:22-61.177.172.160:26450.service - OpenSSH per-connection server daemon (61.177.172.160:26450). Jul 2 07:41:00.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.203.55:22-61.177.172.160:26450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:41:00.183790 kernel: audit: type=1130 audit(1719906060.088:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.203.55:22-61.177.172.160:26450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:41:01.174219 sshd[5460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:41:01.173000 audit[5460]: USER_AUTH pid=5460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:41:01.267778 kernel: audit: type=1100 audit(1719906061.173:343): pid=5460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:41:02.978789 sshd[5454]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:41:03.227645 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:03.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:41:03.227645 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:03.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:41:03.276414 sshd[5461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:41:03.275000 audit[5461]: USER_AUTH pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:41:03.368624 kernel: audit: type=1100 audit(1719906063.275:344): pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:41:05.688297 sshd[5454]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:41:05.986265 sshd[5468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160 user=root Jul 2 07:41:05.985000 audit[5468]: USER_AUTH pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:41:06.079721 kernel: audit: type=1100 audit(1719906065.985:345): pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:41:07.673918 sshd[5454]: PAM: Permission denied for root from 61.177.172.160 Jul 2 07:41:07.822382 sshd[5454]: Received disconnect from 61.177.172.160 port 26450:11: [preauth] Jul 2 07:41:07.822382 sshd[5454]: Disconnected from authenticating user root 61.177.172.160 port 26450 [preauth] Jul 2 07:41:07.821000 audit[5454]: USER_ERR pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:41:07.825775 systemd[1]: sshd@127-147.75.203.55:22-61.177.172.160:26450.service: Deactivated successfully. Jul 2 07:41:07.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.203.55:22-61.177.172.160:26450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:41:07.940100 kernel: audit: type=1109 audit(1719906067.821:346): pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=61.177.172.160 addr=61.177.172.160 terminal=ssh res=failed' Jul 2 07:41:07.940151 kernel: audit: type=1131 audit(1719906067.824:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.203.55:22-61.177.172.160:26450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:41:08.227981 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:08.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:41:08.227981 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:08.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:41:13.228311 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:13.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:41:13.228311 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:13.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:41:18.229268 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:18.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:41:18.229268 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:18.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:41:23.230247 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:23.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"} Jul 2 07:41:23.230247 etcd-wrapper[3343]: {"level":"warn","ts":"2024-07-02T07:41:23.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"53f55400f8b40367","rtt":"0s","error":"dial tcp 10.67.80.31:2380: i/o timeout"}