Sep 4 21:37:48.978187 kernel: microcode: updated early: 0xf4 -> 0xfc, date = 2023-07-27 Sep 4 21:37:48.978201 kernel: Linux version 6.6.48-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.2.1_p20240210 p14) 13.2.1 20240210, GNU ld (Gentoo 2.41 p5) 2.41.0) #1 SMP PREEMPT_DYNAMIC Wed Sep 4 15:49:08 -00 2024 Sep 4 21:37:48.978207 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf Sep 4 21:37:48.978213 kernel: BIOS-provided physical RAM map: Sep 4 21:37:48.978217 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Sep 4 21:37:48.978220 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Sep 4 21:37:48.978225 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Sep 4 21:37:48.978229 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Sep 4 21:37:48.978233 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Sep 4 21:37:48.978237 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b2cfff] usable Sep 4 21:37:48.978241 kernel: BIOS-e820: [mem 0x0000000081b2d000-0x0000000081b2dfff] ACPI NVS Sep 4 21:37:48.978246 kernel: BIOS-e820: [mem 0x0000000081b2e000-0x0000000081b2efff] reserved Sep 4 21:37:48.978250 kernel: BIOS-e820: [mem 0x0000000081b2f000-0x000000008afccfff] usable Sep 4 21:37:48.978254 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Sep 4 21:37:48.978259 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Sep 4 21:37:48.978263 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Sep 4 21:37:48.978269 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Sep 4 21:37:48.978273 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Sep 4 21:37:48.978277 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Sep 4 21:37:48.978282 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Sep 4 21:37:48.978286 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Sep 4 21:37:48.978290 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Sep 4 21:37:48.978295 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Sep 4 21:37:48.978299 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Sep 4 21:37:48.978304 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Sep 4 21:37:48.978308 kernel: NX (Execute Disable) protection: active Sep 4 21:37:48.978312 kernel: APIC: Static calls initialized Sep 4 21:37:48.978317 kernel: SMBIOS 3.2.1 present. Sep 4 21:37:48.978322 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Sep 4 21:37:48.978327 kernel: tsc: Detected 3400.000 MHz processor Sep 4 21:37:48.978331 kernel: tsc: Detected 3399.906 MHz TSC Sep 4 21:37:48.978336 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 4 21:37:48.978341 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 4 21:37:48.978345 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Sep 4 21:37:48.978350 kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 23), built from 10 variable MTRRs Sep 4 21:37:48.978355 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 4 21:37:48.978359 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Sep 4 21:37:48.978364 kernel: Using GB pages for direct mapping Sep 4 21:37:48.978369 kernel: ACPI: Early table checksum verification disabled Sep 4 21:37:48.978374 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Sep 4 21:37:48.978381 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Sep 4 21:37:48.978386 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Sep 4 21:37:48.978391 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Sep 4 21:37:48.978396 kernel: ACPI: FACS 0x000000008C66CF80 000040 Sep 4 21:37:48.978401 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Sep 4 21:37:48.978406 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Sep 4 21:37:48.978411 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Sep 4 21:37:48.978416 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Sep 4 21:37:48.978421 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Sep 4 21:37:48.978426 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Sep 4 21:37:48.978431 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Sep 4 21:37:48.978436 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Sep 4 21:37:48.978441 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978446 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Sep 4 21:37:48.978451 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Sep 4 21:37:48.978456 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978461 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978465 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Sep 4 21:37:48.978470 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Sep 4 21:37:48.978475 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978481 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978486 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Sep 4 21:37:48.978491 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Sep 4 21:37:48.978496 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Sep 4 21:37:48.978501 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Sep 4 21:37:48.978505 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Sep 4 21:37:48.978510 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Sep 4 21:37:48.978515 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Sep 4 21:37:48.978521 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Sep 4 21:37:48.978526 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Sep 4 21:37:48.978531 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Sep 4 21:37:48.978536 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Sep 4 21:37:48.978541 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Sep 4 21:37:48.978545 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Sep 4 21:37:48.978550 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Sep 4 21:37:48.978555 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Sep 4 21:37:48.978560 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Sep 4 21:37:48.978566 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Sep 4 21:37:48.978571 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Sep 4 21:37:48.978575 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Sep 4 21:37:48.978580 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Sep 4 21:37:48.978585 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Sep 4 21:37:48.978590 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Sep 4 21:37:48.978595 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Sep 4 21:37:48.978599 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Sep 4 21:37:48.978604 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Sep 4 21:37:48.978610 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Sep 4 21:37:48.978615 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Sep 4 21:37:48.978620 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Sep 4 21:37:48.978624 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Sep 4 21:37:48.978629 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Sep 4 21:37:48.978634 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Sep 4 21:37:48.978639 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Sep 4 21:37:48.978644 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Sep 4 21:37:48.978649 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Sep 4 21:37:48.978661 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Sep 4 21:37:48.978667 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Sep 4 21:37:48.978690 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Sep 4 21:37:48.978695 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Sep 4 21:37:48.978714 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Sep 4 21:37:48.978719 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Sep 4 21:37:48.978724 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Sep 4 21:37:48.978728 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Sep 4 21:37:48.978733 kernel: No NUMA configuration found Sep 4 21:37:48.978738 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Sep 4 21:37:48.978744 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Sep 4 21:37:48.978749 kernel: Zone ranges: Sep 4 21:37:48.978754 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 4 21:37:48.978759 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 4 21:37:48.978763 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Sep 4 21:37:48.978768 kernel: Movable zone start for each node Sep 4 21:37:48.978773 kernel: Early memory node ranges Sep 4 21:37:48.978778 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Sep 4 21:37:48.978783 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Sep 4 21:37:48.978788 kernel: node 0: [mem 0x0000000040400000-0x0000000081b2cfff] Sep 4 21:37:48.978793 kernel: node 0: [mem 0x0000000081b2f000-0x000000008afccfff] Sep 4 21:37:48.978798 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Sep 4 21:37:48.978803 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Sep 4 21:37:48.978811 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Sep 4 21:37:48.978817 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Sep 4 21:37:48.978822 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 4 21:37:48.978827 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Sep 4 21:37:48.978834 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Sep 4 21:37:48.978839 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Sep 4 21:37:48.978844 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Sep 4 21:37:48.978849 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Sep 4 21:37:48.978854 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Sep 4 21:37:48.978860 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Sep 4 21:37:48.978865 kernel: ACPI: PM-Timer IO Port: 0x1808 Sep 4 21:37:48.978870 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Sep 4 21:37:48.978875 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Sep 4 21:37:48.978881 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Sep 4 21:37:48.978887 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Sep 4 21:37:48.978892 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Sep 4 21:37:48.978897 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Sep 4 21:37:48.978902 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Sep 4 21:37:48.978907 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Sep 4 21:37:48.978912 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Sep 4 21:37:48.978917 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Sep 4 21:37:48.978923 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Sep 4 21:37:48.978928 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Sep 4 21:37:48.978934 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Sep 4 21:37:48.978939 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Sep 4 21:37:48.978944 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Sep 4 21:37:48.978949 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Sep 4 21:37:48.978954 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Sep 4 21:37:48.978959 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 4 21:37:48.978965 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 4 21:37:48.978970 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 4 21:37:48.978975 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Sep 4 21:37:48.978981 kernel: TSC deadline timer available Sep 4 21:37:48.978986 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Sep 4 21:37:48.978991 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Sep 4 21:37:48.978997 kernel: Booting paravirtualized kernel on bare hardware Sep 4 21:37:48.979002 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 4 21:37:48.979007 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1 Sep 4 21:37:48.979013 kernel: percpu: Embedded 58 pages/cpu s196904 r8192 d32472 u262144 Sep 4 21:37:48.979018 kernel: pcpu-alloc: s196904 r8192 d32472 u262144 alloc=1*2097152 Sep 4 21:37:48.979024 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Sep 4 21:37:48.979030 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf Sep 4 21:37:48.979036 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 4 21:37:48.979041 kernel: random: crng init done Sep 4 21:37:48.979047 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Sep 4 21:37:48.979052 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Sep 4 21:37:48.979057 kernel: Fallback order for Node 0: 0 Sep 4 21:37:48.979062 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Sep 4 21:37:48.979067 kernel: Policy zone: Normal Sep 4 21:37:48.979073 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 4 21:37:48.979079 kernel: software IO TLB: area num 16. Sep 4 21:37:48.979084 kernel: Memory: 32714164K/33452980K available (12288K kernel code, 2303K rwdata, 22640K rodata, 49336K init, 2008K bss, 738556K reserved, 0K cma-reserved) Sep 4 21:37:48.979089 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Sep 4 21:37:48.979095 kernel: ftrace: allocating 37670 entries in 148 pages Sep 4 21:37:48.979100 kernel: ftrace: allocated 148 pages with 3 groups Sep 4 21:37:48.979105 kernel: Dynamic Preempt: voluntary Sep 4 21:37:48.979110 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 4 21:37:48.979116 kernel: rcu: RCU event tracing is enabled. Sep 4 21:37:48.979122 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Sep 4 21:37:48.979127 kernel: Trampoline variant of Tasks RCU enabled. Sep 4 21:37:48.979133 kernel: Rude variant of Tasks RCU enabled. Sep 4 21:37:48.979138 kernel: Tracing variant of Tasks RCU enabled. Sep 4 21:37:48.979143 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 4 21:37:48.979148 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Sep 4 21:37:48.979153 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Sep 4 21:37:48.979159 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Sep 4 21:37:48.979164 kernel: Console: colour dummy device 80x25 Sep 4 21:37:48.979170 kernel: printk: console [tty0] enabled Sep 4 21:37:48.979175 kernel: printk: console [ttyS1] enabled Sep 4 21:37:48.979181 kernel: ACPI: Core revision 20230628 Sep 4 21:37:48.979186 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Sep 4 21:37:48.979191 kernel: APIC: Switch to symmetric I/O mode setup Sep 4 21:37:48.979196 kernel: DMAR: Host address width 39 Sep 4 21:37:48.979202 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Sep 4 21:37:48.979207 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Sep 4 21:37:48.979212 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Sep 4 21:37:48.979218 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Sep 4 21:37:48.979223 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Sep 4 21:37:48.979229 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Sep 4 21:37:48.979234 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Sep 4 21:37:48.979239 kernel: x2apic enabled Sep 4 21:37:48.979244 kernel: APIC: Switched APIC routing to: cluster x2apic Sep 4 21:37:48.979249 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Sep 4 21:37:48.979255 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Sep 4 21:37:48.979260 kernel: CPU0: Thermal monitoring enabled (TM1) Sep 4 21:37:48.979266 kernel: process: using mwait in idle threads Sep 4 21:37:48.979271 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 4 21:37:48.979276 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Sep 4 21:37:48.979282 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 4 21:37:48.979287 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Sep 4 21:37:48.979292 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Sep 4 21:37:48.979297 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Sep 4 21:37:48.979302 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Sep 4 21:37:48.979307 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Sep 4 21:37:48.979312 kernel: RETBleed: Mitigation: Enhanced IBRS Sep 4 21:37:48.979317 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 4 21:37:48.979324 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Sep 4 21:37:48.979329 kernel: TAA: Mitigation: TSX disabled Sep 4 21:37:48.979334 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Sep 4 21:37:48.979339 kernel: SRBDS: Mitigation: Microcode Sep 4 21:37:48.979344 kernel: GDS: Mitigation: Microcode Sep 4 21:37:48.979349 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 4 21:37:48.979354 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 4 21:37:48.979360 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 4 21:37:48.979365 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Sep 4 21:37:48.979370 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Sep 4 21:37:48.979375 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 4 21:37:48.979381 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Sep 4 21:37:48.979386 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Sep 4 21:37:48.979391 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Sep 4 21:37:48.979396 kernel: Freeing SMP alternatives memory: 32K Sep 4 21:37:48.979402 kernel: pid_max: default: 32768 minimum: 301 Sep 4 21:37:48.979407 kernel: LSM: initializing lsm=lockdown,capability,selinux,integrity Sep 4 21:37:48.979412 kernel: SELinux: Initializing. Sep 4 21:37:48.979417 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 4 21:37:48.979422 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 4 21:37:48.979427 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Sep 4 21:37:48.979433 kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 4 21:37:48.979439 kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 4 21:37:48.979444 kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 4 21:37:48.979449 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Sep 4 21:37:48.979455 kernel: ... version: 4 Sep 4 21:37:48.979460 kernel: ... bit width: 48 Sep 4 21:37:48.979465 kernel: ... generic registers: 4 Sep 4 21:37:48.979470 kernel: ... value mask: 0000ffffffffffff Sep 4 21:37:48.979475 kernel: ... max period: 00007fffffffffff Sep 4 21:37:48.979480 kernel: ... fixed-purpose events: 3 Sep 4 21:37:48.979486 kernel: ... event mask: 000000070000000f Sep 4 21:37:48.979492 kernel: signal: max sigframe size: 2032 Sep 4 21:37:48.979497 kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Sep 4 21:37:48.979502 kernel: rcu: Hierarchical SRCU implementation. Sep 4 21:37:48.979508 kernel: rcu: Max phase no-delay instances is 400. Sep 4 21:37:48.979513 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Sep 4 21:37:48.979518 kernel: smp: Bringing up secondary CPUs ... Sep 4 21:37:48.979523 kernel: smpboot: x86: Booting SMP configuration: Sep 4 21:37:48.979528 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 Sep 4 21:37:48.979535 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 4 21:37:48.979540 kernel: smp: Brought up 1 node, 16 CPUs Sep 4 21:37:48.979545 kernel: smpboot: Max logical packages: 1 Sep 4 21:37:48.979551 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Sep 4 21:37:48.979556 kernel: devtmpfs: initialized Sep 4 21:37:48.979561 kernel: x86/mm: Memory block size: 128MB Sep 4 21:37:48.979566 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b2d000-0x81b2dfff] (4096 bytes) Sep 4 21:37:48.979571 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Sep 4 21:37:48.979577 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 4 21:37:48.979583 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Sep 4 21:37:48.979588 kernel: pinctrl core: initialized pinctrl subsystem Sep 4 21:37:48.979593 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 4 21:37:48.979598 kernel: audit: initializing netlink subsys (disabled) Sep 4 21:37:48.979604 kernel: audit: type=2000 audit(1725485863.039:1): state=initialized audit_enabled=0 res=1 Sep 4 21:37:48.979609 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 4 21:37:48.979614 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 4 21:37:48.979619 kernel: cpuidle: using governor menu Sep 4 21:37:48.979624 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 4 21:37:48.979630 kernel: dca service started, version 1.12.1 Sep 4 21:37:48.979636 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Sep 4 21:37:48.979641 kernel: PCI: Using configuration type 1 for base access Sep 4 21:37:48.979646 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Sep 4 21:37:48.979651 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 4 21:37:48.979658 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Sep 4 21:37:48.979664 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Sep 4 21:37:48.979691 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Sep 4 21:37:48.979697 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Sep 4 21:37:48.979716 kernel: ACPI: Added _OSI(Module Device) Sep 4 21:37:48.979721 kernel: ACPI: Added _OSI(Processor Device) Sep 4 21:37:48.979726 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Sep 4 21:37:48.979731 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 4 21:37:48.979736 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Sep 4 21:37:48.979742 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979747 kernel: ACPI: SSDT 0xFFFF96CB41063800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Sep 4 21:37:48.979752 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979757 kernel: ACPI: SSDT 0xFFFF96CB4105A800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Sep 4 21:37:48.979763 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979768 kernel: ACPI: SSDT 0xFFFF96CB41042300 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Sep 4 21:37:48.979773 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979778 kernel: ACPI: SSDT 0xFFFF96CB41059800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Sep 4 21:37:48.979784 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979789 kernel: ACPI: SSDT 0xFFFF96CB4106F000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Sep 4 21:37:48.979794 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979799 kernel: ACPI: SSDT 0xFFFF96CB41776C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Sep 4 21:37:48.979804 kernel: ACPI: _OSC evaluated successfully for all CPUs Sep 4 21:37:48.979810 kernel: ACPI: Interpreter enabled Sep 4 21:37:48.979815 kernel: ACPI: PM: (supports S0 S5) Sep 4 21:37:48.979820 kernel: ACPI: Using IOAPIC for interrupt routing Sep 4 21:37:48.979826 kernel: HEST: Enabling Firmware First mode for corrected errors. Sep 4 21:37:48.979831 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Sep 4 21:37:48.979836 kernel: HEST: Table parsing has been initialized. Sep 4 21:37:48.979841 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Sep 4 21:37:48.979846 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 4 21:37:48.979851 kernel: PCI: Using E820 reservations for host bridge windows Sep 4 21:37:48.979858 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Sep 4 21:37:48.979863 kernel: ACPI: \_SB_.PCI0.XDCI.USBC: New power resource Sep 4 21:37:48.979868 kernel: ACPI: \_SB_.PCI0.SAT0.VOL0.V0PR: New power resource Sep 4 21:37:48.979874 kernel: ACPI: \_SB_.PCI0.SAT0.VOL1.V1PR: New power resource Sep 4 21:37:48.979879 kernel: ACPI: \_SB_.PCI0.SAT0.VOL2.V2PR: New power resource Sep 4 21:37:48.979884 kernel: ACPI: \_SB_.PCI0.CNVW.WRST: New power resource Sep 4 21:37:48.979889 kernel: ACPI: \_TZ_.FN00: New power resource Sep 4 21:37:48.979894 kernel: ACPI: \_TZ_.FN01: New power resource Sep 4 21:37:48.979900 kernel: ACPI: \_TZ_.FN02: New power resource Sep 4 21:37:48.979906 kernel: ACPI: \_TZ_.FN03: New power resource Sep 4 21:37:48.979911 kernel: ACPI: \_TZ_.FN04: New power resource Sep 4 21:37:48.979916 kernel: ACPI: \PIN_: New power resource Sep 4 21:37:48.979921 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Sep 4 21:37:48.979996 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 4 21:37:48.980050 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Sep 4 21:37:48.980096 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Sep 4 21:37:48.980104 kernel: PCI host bridge to bus 0000:00 Sep 4 21:37:48.980155 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 4 21:37:48.980197 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 4 21:37:48.980239 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 4 21:37:48.980279 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Sep 4 21:37:48.980321 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Sep 4 21:37:48.980362 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Sep 4 21:37:48.980419 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Sep 4 21:37:48.980477 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Sep 4 21:37:48.980526 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.980579 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Sep 4 21:37:48.980626 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Sep 4 21:37:48.980717 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Sep 4 21:37:48.980766 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Sep 4 21:37:48.980819 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Sep 4 21:37:48.980866 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Sep 4 21:37:48.980913 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Sep 4 21:37:48.980963 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Sep 4 21:37:48.981010 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Sep 4 21:37:48.981056 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Sep 4 21:37:48.981110 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Sep 4 21:37:48.981157 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 4 21:37:48.981207 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Sep 4 21:37:48.981255 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 4 21:37:48.981308 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Sep 4 21:37:48.981355 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Sep 4 21:37:48.981403 kernel: pci 0000:00:16.0: PME# supported from D3hot Sep 4 21:37:48.981454 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Sep 4 21:37:48.981508 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Sep 4 21:37:48.981557 kernel: pci 0000:00:16.1: PME# supported from D3hot Sep 4 21:37:48.981607 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Sep 4 21:37:48.981656 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Sep 4 21:37:48.981737 kernel: pci 0000:00:16.4: PME# supported from D3hot Sep 4 21:37:48.981788 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Sep 4 21:37:48.981834 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Sep 4 21:37:48.981881 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Sep 4 21:37:48.981926 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Sep 4 21:37:48.981974 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Sep 4 21:37:48.982019 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Sep 4 21:37:48.982067 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Sep 4 21:37:48.982116 kernel: pci 0000:00:17.0: PME# supported from D3hot Sep 4 21:37:48.982171 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Sep 4 21:37:48.982220 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982272 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Sep 4 21:37:48.982322 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982376 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Sep 4 21:37:48.982424 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982475 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Sep 4 21:37:48.982524 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982577 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Sep 4 21:37:48.982626 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982711 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Sep 4 21:37:48.982760 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 4 21:37:48.982810 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Sep 4 21:37:48.982862 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Sep 4 21:37:48.982912 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Sep 4 21:37:48.982959 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Sep 4 21:37:48.983012 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Sep 4 21:37:48.983059 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Sep 4 21:37:48.983114 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Sep 4 21:37:48.983163 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Sep 4 21:37:48.983212 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Sep 4 21:37:48.983262 kernel: pci 0000:01:00.0: PME# supported from D3cold Sep 4 21:37:48.983311 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Sep 4 21:37:48.983360 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Sep 4 21:37:48.983414 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Sep 4 21:37:48.983464 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Sep 4 21:37:48.983511 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Sep 4 21:37:48.983561 kernel: pci 0000:01:00.1: PME# supported from D3cold Sep 4 21:37:48.983612 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Sep 4 21:37:48.983663 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Sep 4 21:37:48.983745 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 4 21:37:48.983794 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Sep 4 21:37:48.983840 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Sep 4 21:37:48.983888 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Sep 4 21:37:48.983942 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Sep 4 21:37:48.983993 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Sep 4 21:37:48.984042 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Sep 4 21:37:48.984090 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Sep 4 21:37:48.984139 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Sep 4 21:37:48.984186 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.984235 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Sep 4 21:37:48.984281 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Sep 4 21:37:48.984329 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Sep 4 21:37:48.984385 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Sep 4 21:37:48.984434 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Sep 4 21:37:48.984483 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Sep 4 21:37:48.984531 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Sep 4 21:37:48.984580 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Sep 4 21:37:48.984626 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.984697 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Sep 4 21:37:48.984762 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Sep 4 21:37:48.984810 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Sep 4 21:37:48.984857 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Sep 4 21:37:48.984912 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Sep 4 21:37:48.984962 kernel: pci 0000:06:00.0: enabling Extended Tags Sep 4 21:37:48.985011 kernel: pci 0000:06:00.0: supports D1 D2 Sep 4 21:37:48.985059 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 4 21:37:48.985107 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Sep 4 21:37:48.985158 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Sep 4 21:37:48.985204 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Sep 4 21:37:48.985259 kernel: pci_bus 0000:07: extended config space not accessible Sep 4 21:37:48.985314 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Sep 4 21:37:48.985366 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Sep 4 21:37:48.985416 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Sep 4 21:37:48.985466 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Sep 4 21:37:48.985519 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 4 21:37:48.985569 kernel: pci 0000:07:00.0: supports D1 D2 Sep 4 21:37:48.985620 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 4 21:37:48.985697 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Sep 4 21:37:48.985759 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Sep 4 21:37:48.985808 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Sep 4 21:37:48.985816 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Sep 4 21:37:48.985824 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Sep 4 21:37:48.985830 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Sep 4 21:37:48.985835 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Sep 4 21:37:48.985841 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Sep 4 21:37:48.985846 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Sep 4 21:37:48.985852 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Sep 4 21:37:48.985857 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Sep 4 21:37:48.985863 kernel: iommu: Default domain type: Translated Sep 4 21:37:48.985869 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 4 21:37:48.985875 kernel: PCI: Using ACPI for IRQ routing Sep 4 21:37:48.985881 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 4 21:37:48.985886 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Sep 4 21:37:48.985892 kernel: e820: reserve RAM buffer [mem 0x81b2d000-0x83ffffff] Sep 4 21:37:48.985897 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Sep 4 21:37:48.985903 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Sep 4 21:37:48.985908 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Sep 4 21:37:48.985913 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Sep 4 21:37:48.985962 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Sep 4 21:37:48.986015 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Sep 4 21:37:48.986065 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 4 21:37:48.986073 kernel: vgaarb: loaded Sep 4 21:37:48.986079 kernel: clocksource: Switched to clocksource tsc-early Sep 4 21:37:48.986084 kernel: VFS: Disk quotas dquot_6.6.0 Sep 4 21:37:48.986091 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 4 21:37:48.986097 kernel: pnp: PnP ACPI init Sep 4 21:37:48.986146 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Sep 4 21:37:48.986198 kernel: pnp 00:02: [dma 0 disabled] Sep 4 21:37:48.986246 kernel: pnp 00:03: [dma 0 disabled] Sep 4 21:37:48.986294 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Sep 4 21:37:48.986337 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Sep 4 21:37:48.986386 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Sep 4 21:37:48.986432 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Sep 4 21:37:48.986478 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Sep 4 21:37:48.986522 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Sep 4 21:37:48.986565 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Sep 4 21:37:48.986607 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Sep 4 21:37:48.986649 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Sep 4 21:37:48.986739 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Sep 4 21:37:48.986783 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Sep 4 21:37:48.986828 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Sep 4 21:37:48.986875 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Sep 4 21:37:48.986921 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Sep 4 21:37:48.986965 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Sep 4 21:37:48.987008 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Sep 4 21:37:48.987051 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Sep 4 21:37:48.987094 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Sep 4 21:37:48.987142 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Sep 4 21:37:48.987151 kernel: pnp: PnP ACPI: found 10 devices Sep 4 21:37:48.987157 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 4 21:37:48.987163 kernel: NET: Registered PF_INET protocol family Sep 4 21:37:48.987168 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 4 21:37:48.987174 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 4 21:37:48.987179 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 4 21:37:48.987185 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 4 21:37:48.987191 kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Sep 4 21:37:48.987198 kernel: TCP: Hash tables configured (established 262144 bind 65536) Sep 4 21:37:48.987204 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Sep 4 21:37:48.987209 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Sep 4 21:37:48.987215 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 4 21:37:48.987220 kernel: NET: Registered PF_XDP protocol family Sep 4 21:37:48.987269 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Sep 4 21:37:48.987319 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Sep 4 21:37:48.987367 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Sep 4 21:37:48.987419 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Sep 4 21:37:48.987469 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Sep 4 21:37:48.987519 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Sep 4 21:37:48.987570 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Sep 4 21:37:48.987619 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 4 21:37:48.987686 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Sep 4 21:37:48.987755 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Sep 4 21:37:48.987802 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Sep 4 21:37:48.987852 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Sep 4 21:37:48.987900 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Sep 4 21:37:48.987949 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Sep 4 21:37:48.987996 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Sep 4 21:37:48.988044 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Sep 4 21:37:48.988093 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Sep 4 21:37:48.988141 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Sep 4 21:37:48.988189 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Sep 4 21:37:48.988238 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Sep 4 21:37:48.988287 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Sep 4 21:37:48.988334 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Sep 4 21:37:48.988384 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Sep 4 21:37:48.988430 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Sep 4 21:37:48.988475 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Sep 4 21:37:48.988520 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 4 21:37:48.988563 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 4 21:37:48.988604 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 4 21:37:48.988647 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Sep 4 21:37:48.988734 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Sep 4 21:37:48.988783 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Sep 4 21:37:48.988827 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Sep 4 21:37:48.988880 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Sep 4 21:37:48.988924 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Sep 4 21:37:48.988973 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Sep 4 21:37:48.989017 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Sep 4 21:37:48.989065 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Sep 4 21:37:48.989108 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Sep 4 21:37:48.989157 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Sep 4 21:37:48.989202 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Sep 4 21:37:48.989211 kernel: PCI: CLS 64 bytes, default 64 Sep 4 21:37:48.989216 kernel: DMAR: No ATSR found Sep 4 21:37:48.989222 kernel: DMAR: No SATC found Sep 4 21:37:48.989228 kernel: DMAR: dmar0: Using Queued invalidation Sep 4 21:37:48.989274 kernel: pci 0000:00:00.0: Adding to iommu group 0 Sep 4 21:37:48.989323 kernel: pci 0000:00:01.0: Adding to iommu group 1 Sep 4 21:37:48.989373 kernel: pci 0000:00:08.0: Adding to iommu group 2 Sep 4 21:37:48.989421 kernel: pci 0000:00:12.0: Adding to iommu group 3 Sep 4 21:37:48.989468 kernel: pci 0000:00:14.0: Adding to iommu group 4 Sep 4 21:37:48.989516 kernel: pci 0000:00:14.2: Adding to iommu group 4 Sep 4 21:37:48.989562 kernel: pci 0000:00:15.0: Adding to iommu group 5 Sep 4 21:37:48.989610 kernel: pci 0000:00:15.1: Adding to iommu group 5 Sep 4 21:37:48.989682 kernel: pci 0000:00:16.0: Adding to iommu group 6 Sep 4 21:37:48.989751 kernel: pci 0000:00:16.1: Adding to iommu group 6 Sep 4 21:37:48.989797 kernel: pci 0000:00:16.4: Adding to iommu group 6 Sep 4 21:37:48.989847 kernel: pci 0000:00:17.0: Adding to iommu group 7 Sep 4 21:37:48.989895 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Sep 4 21:37:48.989942 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Sep 4 21:37:48.989988 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Sep 4 21:37:48.990036 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Sep 4 21:37:48.990084 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Sep 4 21:37:48.990131 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Sep 4 21:37:48.990178 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Sep 4 21:37:48.990228 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Sep 4 21:37:48.990275 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Sep 4 21:37:48.990324 kernel: pci 0000:01:00.0: Adding to iommu group 1 Sep 4 21:37:48.990374 kernel: pci 0000:01:00.1: Adding to iommu group 1 Sep 4 21:37:48.990423 kernel: pci 0000:03:00.0: Adding to iommu group 15 Sep 4 21:37:48.990473 kernel: pci 0000:04:00.0: Adding to iommu group 16 Sep 4 21:37:48.990522 kernel: pci 0000:06:00.0: Adding to iommu group 17 Sep 4 21:37:48.990573 kernel: pci 0000:07:00.0: Adding to iommu group 17 Sep 4 21:37:48.990583 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Sep 4 21:37:48.990589 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 4 21:37:48.990594 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Sep 4 21:37:48.990600 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Sep 4 21:37:48.990606 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Sep 4 21:37:48.990611 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Sep 4 21:37:48.990617 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Sep 4 21:37:48.990695 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Sep 4 21:37:48.990726 kernel: Initialise system trusted keyrings Sep 4 21:37:48.990732 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Sep 4 21:37:48.990737 kernel: Key type asymmetric registered Sep 4 21:37:48.990743 kernel: Asymmetric key parser 'x509' registered Sep 4 21:37:48.990748 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Sep 4 21:37:48.990754 kernel: io scheduler mq-deadline registered Sep 4 21:37:48.990759 kernel: io scheduler kyber registered Sep 4 21:37:48.990765 kernel: io scheduler bfq registered Sep 4 21:37:48.990812 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Sep 4 21:37:48.990863 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Sep 4 21:37:48.990913 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Sep 4 21:37:48.990963 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Sep 4 21:37:48.991010 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Sep 4 21:37:48.991058 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Sep 4 21:37:48.991109 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Sep 4 21:37:48.991118 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Sep 4 21:37:48.991126 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Sep 4 21:37:48.991131 kernel: pstore: Using crash dump compression: deflate Sep 4 21:37:48.991137 kernel: pstore: Registered erst as persistent store backend Sep 4 21:37:48.991142 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 4 21:37:48.991148 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 4 21:37:48.991154 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 4 21:37:48.991159 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 4 21:37:48.991165 kernel: hpet_acpi_add: no address or irqs in _CRS Sep 4 21:37:48.991215 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Sep 4 21:37:48.991225 kernel: i8042: PNP: No PS/2 controller found. Sep 4 21:37:48.991268 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Sep 4 21:37:48.991312 kernel: rtc_cmos rtc_cmos: registered as rtc0 Sep 4 21:37:48.991355 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-09-04T21:37:47 UTC (1725485867) Sep 4 21:37:48.991399 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Sep 4 21:37:48.991407 kernel: intel_pstate: Intel P-state driver initializing Sep 4 21:37:48.991413 kernel: intel_pstate: Disabling energy efficiency optimization Sep 4 21:37:48.991418 kernel: intel_pstate: HWP enabled Sep 4 21:37:48.991425 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Sep 4 21:37:48.991431 kernel: vesafb: scrolling: redraw Sep 4 21:37:48.991436 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Sep 4 21:37:48.991442 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000028ef7f9a, using 768k, total 768k Sep 4 21:37:48.991448 kernel: Console: switching to colour frame buffer device 128x48 Sep 4 21:37:48.991454 kernel: fb0: VESA VGA frame buffer device Sep 4 21:37:48.991459 kernel: NET: Registered PF_INET6 protocol family Sep 4 21:37:48.991465 kernel: Segment Routing with IPv6 Sep 4 21:37:48.991470 kernel: In-situ OAM (IOAM) with IPv6 Sep 4 21:37:48.991477 kernel: NET: Registered PF_PACKET protocol family Sep 4 21:37:48.991482 kernel: Key type dns_resolver registered Sep 4 21:37:48.991488 kernel: microcode: Microcode Update Driver: v2.2. Sep 4 21:37:48.991493 kernel: IPI shorthand broadcast: enabled Sep 4 21:37:48.991499 kernel: sched_clock: Marking stable (2475000619, 1380690219)->(4390280870, -534590032) Sep 4 21:37:48.991504 kernel: registered taskstats version 1 Sep 4 21:37:48.991510 kernel: Loading compiled-in X.509 certificates Sep 4 21:37:48.991515 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.6.48-flatcar: a53bb4e7e3319f75620f709d8a6c7aef0adb3b02' Sep 4 21:37:48.991521 kernel: Key type .fscrypt registered Sep 4 21:37:48.991527 kernel: Key type fscrypt-provisioning registered Sep 4 21:37:48.991533 kernel: ima: Allocated hash algorithm: sha1 Sep 4 21:37:48.991538 kernel: ima: No architecture policies found Sep 4 21:37:48.991544 kernel: clk: Disabling unused clocks Sep 4 21:37:48.991549 kernel: Freeing unused kernel image (initmem) memory: 49336K Sep 4 21:37:48.991555 kernel: Write protecting the kernel read-only data: 36864k Sep 4 21:37:48.991560 kernel: Freeing unused kernel image (rodata/data gap) memory: 1936K Sep 4 21:37:48.991566 kernel: Run /init as init process Sep 4 21:37:48.991571 kernel: with arguments: Sep 4 21:37:48.991578 kernel: /init Sep 4 21:37:48.991583 kernel: with environment: Sep 4 21:37:48.991589 kernel: HOME=/ Sep 4 21:37:48.991594 kernel: TERM=linux Sep 4 21:37:48.991599 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 4 21:37:48.991606 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) Sep 4 21:37:48.991613 systemd[1]: Detected architecture x86-64. Sep 4 21:37:48.991620 systemd[1]: Running in initrd. Sep 4 21:37:48.991626 systemd[1]: No hostname configured, using default hostname. Sep 4 21:37:48.991631 systemd[1]: Hostname set to . Sep 4 21:37:48.991637 systemd[1]: Initializing machine ID from random generator. Sep 4 21:37:48.991643 systemd[1]: Queued start job for default target initrd.target. Sep 4 21:37:48.991649 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 4 21:37:48.991657 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 4 21:37:48.991664 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Sep 4 21:37:48.991695 systemd[1]: Expecting device dev-disk-by\x2dlabel-ROOT.device - /dev/disk/by-label/ROOT... Sep 4 21:37:48.991701 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-ROOT.device - /dev/disk/by-partlabel/ROOT... Sep 4 21:37:48.991727 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-USR\x2dA.device - /dev/disk/by-partlabel/USR-A... Sep 4 21:37:48.991734 systemd[1]: Expecting device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132... Sep 4 21:37:48.991740 systemd[1]: Expecting device dev-mapper-usr.device - /dev/mapper/usr... Sep 4 21:37:48.991745 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Sep 4 21:37:48.991751 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Sep 4 21:37:48.991758 kernel: clocksource: Switched to clocksource tsc Sep 4 21:37:48.991764 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 4 21:37:48.991770 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Sep 4 21:37:48.991776 systemd[1]: Reached target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Sep 4 21:37:48.991781 systemd[1]: Reached target paths.target - Path Units. Sep 4 21:37:48.991787 systemd[1]: Reached target slices.target - Slice Units. Sep 4 21:37:48.991793 systemd[1]: Reached target swap.target - Swaps. Sep 4 21:37:48.991799 systemd[1]: Reached target timers.target - Timer Units. Sep 4 21:37:48.991805 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket. Sep 4 21:37:48.991812 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket. Sep 4 21:37:48.991818 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Sep 4 21:37:48.991823 systemd[1]: Listening on systemd-journald.socket - Journal Socket. Sep 4 21:37:48.991829 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Sep 4 21:37:48.991835 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Sep 4 21:37:48.991841 systemd[1]: Reached target sockets.target - Socket Units. Sep 4 21:37:48.991847 systemd[1]: Starting ignition-setup-pre.service - Ignition env setup... Sep 4 21:37:48.991853 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Sep 4 21:37:48.991860 systemd[1]: Starting systemd-fsck-usr.service... Sep 4 21:37:48.991865 systemd[1]: Starting systemd-journald.service - Journal Service... Sep 4 21:37:48.991882 systemd-journald[258]: Collecting audit messages is disabled. Sep 4 21:37:48.991896 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Sep 4 21:37:48.991904 systemd-journald[258]: Journal started Sep 4 21:37:48.991917 systemd-journald[258]: Runtime Journal (/run/log/journal/b3fb8d1a498341df9504f553b5ac8d23) is 8.0M, max 639.9M, 631.9M free. Sep 4 21:37:49.027513 systemd-modules-load[259]: Inserted module 'overlay' Sep 4 21:37:49.036834 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 4 21:37:49.057659 systemd[1]: Started systemd-journald.service - Journal Service. Sep 4 21:37:49.057808 systemd[1]: Finished ignition-setup-pre.service - Ignition env setup. Sep 4 21:37:49.129900 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 4 21:37:49.129913 kernel: Bridge firewalling registered Sep 4 21:37:49.113843 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Sep 4 21:37:49.119153 systemd-modules-load[259]: Inserted module 'br_netfilter' Sep 4 21:37:49.140971 systemd[1]: Finished systemd-fsck-usr.service. Sep 4 21:37:49.151997 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Sep 4 21:37:49.166069 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 4 21:37:49.210933 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 4 21:37:49.216519 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Sep 4 21:37:49.237329 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully... Sep 4 21:37:49.237728 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Sep 4 21:37:49.241168 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Sep 4 21:37:49.242669 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Sep 4 21:37:49.243405 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Sep 4 21:37:49.244753 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Sep 4 21:37:49.249014 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 4 21:37:49.261036 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 4 21:37:49.297951 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Sep 4 21:37:49.317791 dracut-cmdline[295]: dracut-dracut-053 Sep 4 21:37:49.317791 dracut-cmdline[295]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf Sep 4 21:37:49.446687 kernel: SCSI subsystem initialized Sep 4 21:37:49.470659 kernel: Loading iSCSI transport class v2.0-870. Sep 4 21:37:49.494706 kernel: iscsi: registered transport (tcp) Sep 4 21:37:49.530230 kernel: iscsi: registered transport (qla4xxx) Sep 4 21:37:49.530249 kernel: QLogic iSCSI HBA Driver Sep 4 21:37:49.564138 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Sep 4 21:37:49.593966 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Sep 4 21:37:49.656508 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 4 21:37:49.656528 kernel: device-mapper: uevent: version 1.0.3 Sep 4 21:37:49.676289 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@redhat.com Sep 4 21:37:49.737740 kernel: raid6: avx2x4 gen() 53958 MB/s Sep 4 21:37:49.769719 kernel: raid6: avx2x2 gen() 55000 MB/s Sep 4 21:37:49.806350 kernel: raid6: avx2x1 gen() 45354 MB/s Sep 4 21:37:49.806368 kernel: raid6: using algorithm avx2x2 gen() 55000 MB/s Sep 4 21:37:49.854268 kernel: raid6: .... xor() 30762 MB/s, rmw enabled Sep 4 21:37:49.854286 kernel: raid6: using avx2x2 recovery algorithm Sep 4 21:37:49.898693 kernel: xor: automatically using best checksumming function avx Sep 4 21:37:50.024689 kernel: Btrfs loaded, zoned=no, fsverity=no Sep 4 21:37:50.030215 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Sep 4 21:37:50.054019 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 4 21:37:50.060319 systemd-udevd[484]: Using default interface naming scheme 'v255'. Sep 4 21:37:50.064824 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 4 21:37:50.093881 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Sep 4 21:37:50.145035 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Sep 4 21:37:50.162853 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Sep 4 21:37:50.190979 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Sep 4 21:37:50.280308 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Sep 4 21:37:50.306031 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 4 21:37:50.325723 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 4 21:37:50.325760 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 4 21:37:50.306133 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 4 21:37:50.406906 kernel: cryptd: max_cpu_qlen set to 1000 Sep 4 21:37:50.406928 kernel: ACPI: bus type USB registered Sep 4 21:37:50.406940 kernel: usbcore: registered new interface driver usbfs Sep 4 21:37:50.406954 kernel: usbcore: registered new interface driver hub Sep 4 21:37:50.406971 kernel: usbcore: registered new device driver usb Sep 4 21:37:50.406962 systemd[1]: Stopping dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 4 21:37:50.439732 kernel: PTP clock support registered Sep 4 21:37:50.439750 kernel: libata version 3.00 loaded. Sep 4 21:37:50.439759 kernel: AVX2 version of gcm_enc/dec engaged. Sep 4 21:37:50.421718 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 4 21:37:50.449233 kernel: AES CTR mode by8 optimization enabled Sep 4 21:37:50.421850 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Sep 4 21:37:51.198699 kernel: ahci 0000:00:17.0: version 3.0 Sep 4 21:37:51.198809 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Sep 4 21:37:51.198887 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Sep 4 21:37:51.198960 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Sep 4 21:37:51.199032 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Sep 4 21:37:51.199106 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Sep 4 21:37:51.199177 kernel: scsi host0: ahci Sep 4 21:37:51.199251 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Sep 4 21:37:51.199321 kernel: scsi host1: ahci Sep 4 21:37:51.199391 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Sep 4 21:37:51.199462 kernel: scsi host2: ahci Sep 4 21:37:51.199530 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Sep 4 21:37:51.199603 kernel: hub 1-0:1.0: USB hub found Sep 4 21:37:51.199922 kernel: scsi host3: ahci Sep 4 21:37:51.199992 kernel: hub 1-0:1.0: 16 ports detected Sep 4 21:37:51.200070 kernel: scsi host4: ahci Sep 4 21:37:51.200138 kernel: hub 2-0:1.0: USB hub found Sep 4 21:37:51.200218 kernel: scsi host5: ahci Sep 4 21:37:51.200287 kernel: hub 2-0:1.0: 10 ports detected Sep 4 21:37:51.200365 kernel: scsi host6: ahci Sep 4 21:37:51.200436 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Sep 4 21:37:51.200446 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Sep 4 21:37:51.200455 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Sep 4 21:37:51.200464 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Sep 4 21:37:51.200473 kernel: pps pps0: new PPS source ptp0 Sep 4 21:37:51.200543 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Sep 4 21:37:51.200556 kernel: igb 0000:03:00.0: added PHC on eth0 Sep 4 21:37:51.200635 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Sep 4 21:37:51.200645 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Sep 4 21:37:51.200724 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Sep 4 21:37:51.200734 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:7a Sep 4 21:37:51.200806 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Sep 4 21:37:51.200816 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Sep 4 21:37:51.200887 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Sep 4 21:37:51.200899 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Sep 4 21:37:51.200971 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Sep 4 21:37:51.201313 kernel: pps pps1: new PPS source ptp1 Sep 4 21:37:51.201382 kernel: hub 1-14:1.0: USB hub found Sep 4 21:37:51.201465 kernel: igb 0000:04:00.0: added PHC on eth1 Sep 4 21:37:51.201542 kernel: hub 1-14:1.0: 4 ports detected Sep 4 21:37:51.201621 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Sep 4 21:37:51.201699 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Sep 4 21:37:51.201710 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:7b Sep 4 21:37:51.201781 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:51.201792 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Sep 4 21:37:51.201863 kernel: ata3: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:51.201873 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Sep 4 21:37:51.201945 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Sep 4 21:37:51.201954 kernel: ata7: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:50.506739 systemd[1]: Stopping systemd-vconsole-setup.service - Virtual Console Setup... Sep 4 21:37:51.243497 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Sep 4 21:37:51.243509 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:51.243521 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:51.259708 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Sep 4 21:37:51.284656 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Sep 4 21:37:51.284678 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Sep 4 21:37:51.321713 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Sep 4 21:37:51.321743 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Sep 4 21:37:51.322913 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 4 21:37:51.434091 kernel: ata1.00: Features: NCQ-prio Sep 4 21:37:51.434106 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Sep 4 21:37:51.434205 kernel: ata2.00: Features: NCQ-prio Sep 4 21:37:51.434214 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 4 21:37:51.434222 kernel: ata1.00: configured for UDMA/133 Sep 4 21:37:51.434229 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Sep 4 21:37:51.434300 kernel: ata2.00: configured for UDMA/133 Sep 4 21:37:51.459708 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Sep 4 21:37:51.479038 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 4 21:37:51.508777 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Sep 4 21:37:51.508867 kernel: usbcore: registered new interface driver usbhid Sep 4 21:37:51.514664 kernel: usbhid: USB HID core driver Sep 4 21:37:51.531827 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 4 21:37:51.581166 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Sep 4 21:37:51.581177 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Sep 4 21:37:51.592741 kernel: ata2.00: Enabling discard_zeroes_data Sep 4 21:37:51.592760 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Sep 4 21:37:51.592847 kernel: ata1.00: Enabling discard_zeroes_data Sep 4 21:37:51.592856 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Sep 4 21:37:51.592932 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Sep 4 21:37:51.594718 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Sep 4 21:37:51.594811 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Sep 4 21:37:51.594824 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Sep 4 21:37:51.606618 kernel: mlx5_core 0000:01:00.0: Port module event: module 0, Cable plugged Sep 4 21:37:51.606716 kernel: sd 1:0:0:0: [sdb] Write Protect is off Sep 4 21:37:51.606797 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Sep 4 21:37:51.606861 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 4 21:37:51.606923 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 4 21:37:51.606982 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Sep 4 21:37:51.607043 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Sep 4 21:37:51.607103 kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes Sep 4 21:37:51.607161 kernel: ata1.00: Enabling discard_zeroes_data Sep 4 21:37:51.608702 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 4 21:37:51.609697 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 4 21:37:51.614275 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 4 21:37:52.180591 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (533) Sep 4 21:37:52.180613 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Sep 4 21:37:52.180708 kernel: BTRFS: device fsid d110be6f-93a3-451a-b365-11b5d04e0602 devid 1 transid 33 /dev/sda3 scanned by (udev-worker) (530) Sep 4 21:37:52.180717 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Sep 4 21:37:52.180781 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic) Sep 4 21:37:52.180855 kernel: sd 1:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Sep 4 21:37:52.180915 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Sep 4 21:37:52.180982 kernel: ata2.00: Enabling discard_zeroes_data Sep 4 21:37:52.180990 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Sep 4 21:37:52.181053 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Sep 4 21:37:52.181113 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Sep 4 21:37:52.206766 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Sep 4 21:37:52.222797 systemd[1]: Found device dev-disk-by\x2dpartlabel-ROOT.device - Micron_5300_MTFDDAK480TDT ROOT. Sep 4 21:37:52.233837 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Micron_5300_MTFDDAK480TDT ROOT. Sep 4 21:37:52.244734 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5300_MTFDDAK480TDT OEM. Sep 4 21:37:52.281386 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Micron_5300_MTFDDAK480TDT USR-A. Sep 4 21:37:52.298832 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Micron_5300_MTFDDAK480TDT USR-A. Sep 4 21:37:52.337113 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Sep 4 21:37:52.366928 systemd[1]: Starting decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition... Sep 4 21:37:52.379512 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary... Sep 4 21:37:52.393522 systemd[1]: Finished decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition. Sep 4 21:37:52.462757 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic) Sep 4 21:37:52.462877 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Sep 4 21:37:52.468144 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Sep 4 21:37:52.501795 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Sep 4 21:37:52.484871 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 4 21:37:52.484917 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary. Sep 4 21:37:52.515848 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Sep 4 21:37:52.521939 systemd[1]: Reached target local-fs.target - Local File Systems. Sep 4 21:37:52.549844 systemd[1]: Reached target sysinit.target - System Initialization. Sep 4 21:37:52.567836 systemd[1]: Reached target basic.target - Basic System. Sep 4 21:37:52.598026 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr... Sep 4 21:37:52.602630 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Sep 4 21:37:52.632962 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Sep 4 21:37:52.680852 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 4 21:37:52.659738 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 4 21:37:52.691745 systemd[1]: Reached target remote-fs.target - Remote File Systems. Sep 4 21:37:52.720792 sh[708]: Success Sep 4 21:37:52.726817 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Sep 4 21:37:52.730803 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr. Sep 4 21:37:52.765262 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Sep 4 21:37:52.775174 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr. Sep 4 21:37:52.823898 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr... Sep 4 21:37:52.832108 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT... Sep 4 21:37:52.988889 kernel: BTRFS info (device dm-0): first mount of filesystem d110be6f-93a3-451a-b365-11b5d04e0602 Sep 4 21:37:52.988903 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm Sep 4 21:37:52.988911 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead Sep 4 21:37:52.988919 kernel: BTRFS info (device dm-0): disabling log replay at mount time Sep 4 21:37:52.988926 kernel: BTRFS info (device dm-0): using free space tree Sep 4 21:37:52.988933 kernel: BTRFS info (device dm-0): enabling ssd optimizations Sep 4 21:37:52.975200 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr. Sep 4 21:37:53.016828 systemd-fsck[753]: ROOT: clean, 77/553520 files, 52714/553472 blocks Sep 4 21:37:53.027190 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT. Sep 4 21:37:53.044796 systemd[1]: Mounting sysroot.mount - /sysroot... Sep 4 21:37:53.158441 systemd[1]: Mounted sysroot.mount - /sysroot. Sep 4 21:37:53.174897 kernel: EXT4-fs (sda9): mounted filesystem 84a5cefa-c3c7-47d7-9305-7e6877f73628 r/w with ordered data mode. Quota mode: none. Sep 4 21:37:53.167130 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Sep 4 21:37:53.184886 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Sep 4 21:37:53.194784 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr... Sep 4 21:37:53.234659 kernel: BTRFS info (device sda6): first mount of filesystem 50e7422b-f0c7-4536-902a-3ab4c864240b Sep 4 21:37:53.234677 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 4 21:37:53.234710 kernel: BTRFS info (device sda6): using free space tree Sep 4 21:37:53.249001 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr. Sep 4 21:37:53.331841 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 4 21:37:53.331853 kernel: BTRFS info (device sda6): auto enabling async discard Sep 4 21:37:53.323496 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Sep 4 21:37:53.350888 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup... Sep 4 21:37:53.422883 initrd-setup-root[787]: cut: /sysroot/etc/passwd: No such file or directory Sep 4 21:37:53.432768 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory Sep 4 21:37:53.443723 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory Sep 4 21:37:53.453759 initrd-setup-root[808]: cut: /sysroot/etc/gshadow: No such file or directory Sep 4 21:37:53.523686 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup. Sep 4 21:37:53.547911 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion... Sep 4 21:37:53.562096 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion. Sep 4 21:37:53.581101 systemd[1]: Reached target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Sep 4 21:37:53.617117 initrd-setup-root-after-ignition[956]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 4 21:37:53.617117 initrd-setup-root-after-ignition[956]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory Sep 4 21:37:53.652867 initrd-setup-root-after-ignition[960]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 4 21:37:53.618049 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root... Sep 4 21:37:53.699457 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 4 21:37:53.699803 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root. Sep 4 21:37:53.719868 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Sep 4 21:37:53.741902 systemd[1]: Reached target initrd.target - Initrd Default Target. Sep 4 21:37:53.763108 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met. Sep 4 21:37:53.775024 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Sep 4 21:37:53.855472 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Sep 4 21:37:53.879049 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Sep 4 21:37:53.924633 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 4 21:37:53.935911 systemd[1]: Stopped target timers.target - Timer Units. Sep 4 21:37:53.955958 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 4 21:37:53.956073 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Sep 4 21:37:53.984110 systemd[1]: Stopped target initrd.target - Initrd Default Target. Sep 4 21:37:54.005225 systemd[1]: Stopped target basic.target - Basic System. Sep 4 21:37:54.025219 systemd[1]: Stopped target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Sep 4 21:37:54.044233 systemd[1]: Stopped target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Sep 4 21:37:54.069341 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Sep 4 21:37:54.093235 systemd[1]: Stopped target paths.target - Path Units. Sep 4 21:37:54.112339 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Sep 4 21:37:54.132247 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Sep 4 21:37:54.154375 systemd[1]: Stopped target slices.target - Slice Units. Sep 4 21:37:54.175226 systemd[1]: Stopped target sockets.target - Socket Units. Sep 4 21:37:54.193232 systemd[1]: Stopped target sysinit.target - System Initialization. Sep 4 21:37:54.211231 systemd[1]: Stopped target local-fs.target - Local File Systems. Sep 4 21:37:54.231220 systemd[1]: Stopped target swap.target - Swaps. Sep 4 21:37:54.250196 systemd[1]: iscsid.socket: Deactivated successfully. Sep 4 21:37:54.250471 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket. Sep 4 21:37:54.268305 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 4 21:37:54.268602 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket. Sep 4 21:37:54.288376 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 4 21:37:54.288781 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Sep 4 21:37:54.315391 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Sep 4 21:37:54.335141 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 4 21:37:54.335598 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 4 21:37:54.356282 systemd[1]: Stopped target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 4 21:37:54.378247 systemd[1]: clevis-luks-askpass.path: Deactivated successfully. Sep 4 21:37:54.378731 systemd[1]: Stopped clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 4 21:37:54.399148 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 4 21:37:54.399542 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Sep 4 21:37:54.433186 systemd[1]: decrypt-root.service: Deactivated successfully. Sep 4 21:37:54.433622 systemd[1]: Stopped decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition. Sep 4 21:37:54.457454 systemd[1]: ignition-setup-pre.service: Deactivated successfully. Sep 4 21:37:54.457862 systemd[1]: Stopped ignition-setup-pre.service - Ignition env setup. Sep 4 21:37:54.476338 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 4 21:37:54.476758 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion. Sep 4 21:37:54.501349 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 4 21:37:54.501755 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup. Sep 4 21:37:54.519252 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 4 21:37:54.519607 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Sep 4 21:37:54.540317 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 4 21:37:54.540727 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Sep 4 21:37:54.559348 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Sep 4 21:37:54.559753 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Sep 4 21:37:54.584327 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 4 21:37:54.584733 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Sep 4 21:37:54.605348 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 4 21:37:54.605755 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Sep 4 21:37:54.636786 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 4 21:37:54.664245 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 4 21:37:54.664577 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 4 21:37:54.684312 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 4 21:37:54.684535 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Sep 4 21:37:54.701912 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 4 21:37:54.702070 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Sep 4 21:37:54.718966 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 4 21:37:54.719064 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Sep 4 21:37:54.738972 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 4 21:37:54.739131 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Sep 4 21:37:54.769194 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 4 21:37:54.769363 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Sep 4 21:37:54.800169 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 4 21:37:55.092834 systemd-journald[258]: Received SIGTERM from PID 1 (systemd). Sep 4 21:37:54.800343 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 4 21:37:54.840926 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Sep 4 21:37:54.840951 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 4 21:37:54.841011 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 4 21:37:54.881913 systemd[1]: systemd-tmpfiles-setup-dev-early.service: Deactivated successfully. Sep 4 21:37:54.881982 systemd[1]: Stopped systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Sep 4 21:37:54.900998 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 4 21:37:54.901111 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Sep 4 21:37:54.925040 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 4 21:37:54.925201 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Sep 4 21:37:54.947124 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 4 21:37:54.947370 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Sep 4 21:37:54.969083 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Sep 4 21:37:55.004023 systemd[1]: Starting initrd-switch-root.service - Switch Root... Sep 4 21:37:55.027907 systemd[1]: Switching root. Sep 4 21:37:55.093209 systemd-journald[258]: Journal stopped Sep 4 21:37:48.978187 kernel: microcode: updated early: 0xf4 -> 0xfc, date = 2023-07-27 Sep 4 21:37:48.978201 kernel: Linux version 6.6.48-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.2.1_p20240210 p14) 13.2.1 20240210, GNU ld (Gentoo 2.41 p5) 2.41.0) #1 SMP PREEMPT_DYNAMIC Wed Sep 4 15:49:08 -00 2024 Sep 4 21:37:48.978207 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf Sep 4 21:37:48.978213 kernel: BIOS-provided physical RAM map: Sep 4 21:37:48.978217 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Sep 4 21:37:48.978220 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Sep 4 21:37:48.978225 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Sep 4 21:37:48.978229 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Sep 4 21:37:48.978233 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Sep 4 21:37:48.978237 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b2cfff] usable Sep 4 21:37:48.978241 kernel: BIOS-e820: [mem 0x0000000081b2d000-0x0000000081b2dfff] ACPI NVS Sep 4 21:37:48.978246 kernel: BIOS-e820: [mem 0x0000000081b2e000-0x0000000081b2efff] reserved Sep 4 21:37:48.978250 kernel: BIOS-e820: [mem 0x0000000081b2f000-0x000000008afccfff] usable Sep 4 21:37:48.978254 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Sep 4 21:37:48.978259 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Sep 4 21:37:48.978263 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Sep 4 21:37:48.978269 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Sep 4 21:37:48.978273 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Sep 4 21:37:48.978277 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Sep 4 21:37:48.978282 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Sep 4 21:37:48.978286 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Sep 4 21:37:48.978290 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Sep 4 21:37:48.978295 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Sep 4 21:37:48.978299 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Sep 4 21:37:48.978304 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Sep 4 21:37:48.978308 kernel: NX (Execute Disable) protection: active Sep 4 21:37:48.978312 kernel: APIC: Static calls initialized Sep 4 21:37:48.978317 kernel: SMBIOS 3.2.1 present. Sep 4 21:37:48.978322 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Sep 4 21:37:48.978327 kernel: tsc: Detected 3400.000 MHz processor Sep 4 21:37:48.978331 kernel: tsc: Detected 3399.906 MHz TSC Sep 4 21:37:48.978336 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 4 21:37:48.978341 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 4 21:37:48.978345 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Sep 4 21:37:48.978350 kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 23), built from 10 variable MTRRs Sep 4 21:37:48.978355 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 4 21:37:48.978359 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Sep 4 21:37:48.978364 kernel: Using GB pages for direct mapping Sep 4 21:37:48.978369 kernel: ACPI: Early table checksum verification disabled Sep 4 21:37:48.978374 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Sep 4 21:37:48.978381 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Sep 4 21:37:48.978386 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Sep 4 21:37:48.978391 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Sep 4 21:37:48.978396 kernel: ACPI: FACS 0x000000008C66CF80 000040 Sep 4 21:37:48.978401 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Sep 4 21:37:48.978406 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Sep 4 21:37:48.978411 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Sep 4 21:37:48.978416 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Sep 4 21:37:48.978421 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Sep 4 21:37:48.978426 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Sep 4 21:37:48.978431 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Sep 4 21:37:48.978436 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Sep 4 21:37:48.978441 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978446 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Sep 4 21:37:48.978451 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Sep 4 21:37:48.978456 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978461 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978465 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Sep 4 21:37:48.978470 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Sep 4 21:37:48.978475 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978481 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Sep 4 21:37:48.978486 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Sep 4 21:37:48.978491 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Sep 4 21:37:48.978496 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Sep 4 21:37:48.978501 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Sep 4 21:37:48.978505 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Sep 4 21:37:48.978510 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Sep 4 21:37:48.978515 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Sep 4 21:37:48.978521 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Sep 4 21:37:48.978526 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Sep 4 21:37:48.978531 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Sep 4 21:37:48.978536 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Sep 4 21:37:48.978541 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Sep 4 21:37:48.978545 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Sep 4 21:37:48.978550 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Sep 4 21:37:48.978555 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Sep 4 21:37:48.978560 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Sep 4 21:37:48.978566 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Sep 4 21:37:48.978571 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Sep 4 21:37:48.978575 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Sep 4 21:37:48.978580 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Sep 4 21:37:48.978585 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Sep 4 21:37:48.978590 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Sep 4 21:37:48.978595 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Sep 4 21:37:48.978599 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Sep 4 21:37:48.978604 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Sep 4 21:37:48.978610 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Sep 4 21:37:48.978615 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Sep 4 21:37:48.978620 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Sep 4 21:37:48.978624 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Sep 4 21:37:48.978629 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Sep 4 21:37:48.978634 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Sep 4 21:37:48.978639 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Sep 4 21:37:48.978644 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Sep 4 21:37:48.978649 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Sep 4 21:37:48.978661 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Sep 4 21:37:48.978667 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Sep 4 21:37:48.978690 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Sep 4 21:37:48.978695 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Sep 4 21:37:48.978714 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Sep 4 21:37:48.978719 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Sep 4 21:37:48.978724 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Sep 4 21:37:48.978728 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Sep 4 21:37:48.978733 kernel: No NUMA configuration found Sep 4 21:37:48.978738 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Sep 4 21:37:48.978744 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Sep 4 21:37:48.978749 kernel: Zone ranges: Sep 4 21:37:48.978754 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 4 21:37:48.978759 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 4 21:37:48.978763 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Sep 4 21:37:48.978768 kernel: Movable zone start for each node Sep 4 21:37:48.978773 kernel: Early memory node ranges Sep 4 21:37:48.978778 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Sep 4 21:37:48.978783 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Sep 4 21:37:48.978788 kernel: node 0: [mem 0x0000000040400000-0x0000000081b2cfff] Sep 4 21:37:48.978793 kernel: node 0: [mem 0x0000000081b2f000-0x000000008afccfff] Sep 4 21:37:48.978798 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Sep 4 21:37:48.978803 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Sep 4 21:37:48.978811 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Sep 4 21:37:48.978817 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Sep 4 21:37:48.978822 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 4 21:37:48.978827 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Sep 4 21:37:48.978834 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Sep 4 21:37:48.978839 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Sep 4 21:37:48.978844 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Sep 4 21:37:48.978849 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Sep 4 21:37:48.978854 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Sep 4 21:37:48.978860 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Sep 4 21:37:48.978865 kernel: ACPI: PM-Timer IO Port: 0x1808 Sep 4 21:37:48.978870 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Sep 4 21:37:48.978875 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Sep 4 21:37:48.978881 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Sep 4 21:37:48.978887 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Sep 4 21:37:48.978892 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Sep 4 21:37:48.978897 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Sep 4 21:37:48.978902 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Sep 4 21:37:48.978907 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Sep 4 21:37:48.978912 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Sep 4 21:37:48.978917 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Sep 4 21:37:48.978923 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Sep 4 21:37:48.978928 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Sep 4 21:37:48.978934 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Sep 4 21:37:48.978939 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Sep 4 21:37:48.978944 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Sep 4 21:37:48.978949 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Sep 4 21:37:48.978954 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Sep 4 21:37:48.978959 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 4 21:37:48.978965 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 4 21:37:48.978970 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 4 21:37:48.978975 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Sep 4 21:37:48.978981 kernel: TSC deadline timer available Sep 4 21:37:48.978986 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Sep 4 21:37:48.978991 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Sep 4 21:37:48.978997 kernel: Booting paravirtualized kernel on bare hardware Sep 4 21:37:48.979002 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 4 21:37:48.979007 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1 Sep 4 21:37:48.979013 kernel: percpu: Embedded 58 pages/cpu s196904 r8192 d32472 u262144 Sep 4 21:37:48.979018 kernel: pcpu-alloc: s196904 r8192 d32472 u262144 alloc=1*2097152 Sep 4 21:37:48.979024 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Sep 4 21:37:48.979030 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf Sep 4 21:37:48.979036 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 4 21:37:48.979041 kernel: random: crng init done Sep 4 21:37:48.979047 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Sep 4 21:37:48.979052 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Sep 4 21:37:48.979057 kernel: Fallback order for Node 0: 0 Sep 4 21:37:48.979062 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Sep 4 21:37:48.979067 kernel: Policy zone: Normal Sep 4 21:37:48.979073 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 4 21:37:48.979079 kernel: software IO TLB: area num 16. Sep 4 21:37:48.979084 kernel: Memory: 32714164K/33452980K available (12288K kernel code, 2303K rwdata, 22640K rodata, 49336K init, 2008K bss, 738556K reserved, 0K cma-reserved) Sep 4 21:37:48.979089 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Sep 4 21:37:48.979095 kernel: ftrace: allocating 37670 entries in 148 pages Sep 4 21:37:48.979100 kernel: ftrace: allocated 148 pages with 3 groups Sep 4 21:37:48.979105 kernel: Dynamic Preempt: voluntary Sep 4 21:37:48.979110 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 4 21:37:48.979116 kernel: rcu: RCU event tracing is enabled. Sep 4 21:37:48.979122 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Sep 4 21:37:48.979127 kernel: Trampoline variant of Tasks RCU enabled. Sep 4 21:37:48.979133 kernel: Rude variant of Tasks RCU enabled. Sep 4 21:37:48.979138 kernel: Tracing variant of Tasks RCU enabled. Sep 4 21:37:48.979143 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 4 21:37:48.979148 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Sep 4 21:37:48.979153 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Sep 4 21:37:48.979159 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Sep 4 21:37:48.979164 kernel: Console: colour dummy device 80x25 Sep 4 21:37:48.979170 kernel: printk: console [tty0] enabled Sep 4 21:37:48.979175 kernel: printk: console [ttyS1] enabled Sep 4 21:37:48.979181 kernel: ACPI: Core revision 20230628 Sep 4 21:37:48.979186 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Sep 4 21:37:48.979191 kernel: APIC: Switch to symmetric I/O mode setup Sep 4 21:37:48.979196 kernel: DMAR: Host address width 39 Sep 4 21:37:48.979202 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Sep 4 21:37:48.979207 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Sep 4 21:37:48.979212 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Sep 4 21:37:48.979218 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Sep 4 21:37:48.979223 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Sep 4 21:37:48.979229 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Sep 4 21:37:48.979234 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Sep 4 21:37:48.979239 kernel: x2apic enabled Sep 4 21:37:48.979244 kernel: APIC: Switched APIC routing to: cluster x2apic Sep 4 21:37:48.979249 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Sep 4 21:37:48.979255 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Sep 4 21:37:48.979260 kernel: CPU0: Thermal monitoring enabled (TM1) Sep 4 21:37:48.979266 kernel: process: using mwait in idle threads Sep 4 21:37:48.979271 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 4 21:37:48.979276 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Sep 4 21:37:48.979282 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 4 21:37:48.979287 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Sep 4 21:37:48.979292 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Sep 4 21:37:48.979297 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Sep 4 21:37:48.979302 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Sep 4 21:37:48.979307 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Sep 4 21:37:48.979312 kernel: RETBleed: Mitigation: Enhanced IBRS Sep 4 21:37:48.979317 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 4 21:37:48.979324 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Sep 4 21:37:48.979329 kernel: TAA: Mitigation: TSX disabled Sep 4 21:37:48.979334 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Sep 4 21:37:48.979339 kernel: SRBDS: Mitigation: Microcode Sep 4 21:37:48.979344 kernel: GDS: Mitigation: Microcode Sep 4 21:37:48.979349 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 4 21:37:48.979354 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 4 21:37:48.979360 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 4 21:37:48.979365 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Sep 4 21:37:48.979370 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Sep 4 21:37:48.979375 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 4 21:37:48.979381 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Sep 4 21:37:48.979386 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Sep 4 21:37:48.979391 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Sep 4 21:37:48.979396 kernel: Freeing SMP alternatives memory: 32K Sep 4 21:37:48.979402 kernel: pid_max: default: 32768 minimum: 301 Sep 4 21:37:48.979407 kernel: LSM: initializing lsm=lockdown,capability,selinux,integrity Sep 4 21:37:48.979412 kernel: SELinux: Initializing. Sep 4 21:37:48.979417 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 4 21:37:48.979422 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 4 21:37:48.979427 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Sep 4 21:37:48.979433 kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 4 21:37:48.979439 kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 4 21:37:48.979444 kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 4 21:37:48.979449 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Sep 4 21:37:48.979455 kernel: ... version: 4 Sep 4 21:37:48.979460 kernel: ... bit width: 48 Sep 4 21:37:48.979465 kernel: ... generic registers: 4 Sep 4 21:37:48.979470 kernel: ... value mask: 0000ffffffffffff Sep 4 21:37:48.979475 kernel: ... max period: 00007fffffffffff Sep 4 21:37:48.979480 kernel: ... fixed-purpose events: 3 Sep 4 21:37:48.979486 kernel: ... event mask: 000000070000000f Sep 4 21:37:48.979492 kernel: signal: max sigframe size: 2032 Sep 4 21:37:48.979497 kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Sep 4 21:37:48.979502 kernel: rcu: Hierarchical SRCU implementation. Sep 4 21:37:48.979508 kernel: rcu: Max phase no-delay instances is 400. Sep 4 21:37:48.979513 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Sep 4 21:37:48.979518 kernel: smp: Bringing up secondary CPUs ... Sep 4 21:37:48.979523 kernel: smpboot: x86: Booting SMP configuration: Sep 4 21:37:48.979528 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 Sep 4 21:37:48.979535 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 4 21:37:48.979540 kernel: smp: Brought up 1 node, 16 CPUs Sep 4 21:37:48.979545 kernel: smpboot: Max logical packages: 1 Sep 4 21:37:48.979551 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Sep 4 21:37:48.979556 kernel: devtmpfs: initialized Sep 4 21:37:48.979561 kernel: x86/mm: Memory block size: 128MB Sep 4 21:37:48.979566 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b2d000-0x81b2dfff] (4096 bytes) Sep 4 21:37:48.979571 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Sep 4 21:37:48.979577 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 4 21:37:48.979583 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Sep 4 21:37:48.979588 kernel: pinctrl core: initialized pinctrl subsystem Sep 4 21:37:48.979593 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 4 21:37:48.979598 kernel: audit: initializing netlink subsys (disabled) Sep 4 21:37:48.979604 kernel: audit: type=2000 audit(1725485863.039:1): state=initialized audit_enabled=0 res=1 Sep 4 21:37:48.979609 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 4 21:37:48.979614 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 4 21:37:48.979619 kernel: cpuidle: using governor menu Sep 4 21:37:48.979624 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 4 21:37:48.979630 kernel: dca service started, version 1.12.1 Sep 4 21:37:48.979636 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Sep 4 21:37:48.979641 kernel: PCI: Using configuration type 1 for base access Sep 4 21:37:48.979646 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Sep 4 21:37:48.979651 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 4 21:37:48.979658 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Sep 4 21:37:48.979664 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Sep 4 21:37:48.979691 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Sep 4 21:37:48.979697 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Sep 4 21:37:48.979716 kernel: ACPI: Added _OSI(Module Device) Sep 4 21:37:48.979721 kernel: ACPI: Added _OSI(Processor Device) Sep 4 21:37:48.979726 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Sep 4 21:37:48.979731 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 4 21:37:48.979736 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Sep 4 21:37:48.979742 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979747 kernel: ACPI: SSDT 0xFFFF96CB41063800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Sep 4 21:37:48.979752 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979757 kernel: ACPI: SSDT 0xFFFF96CB4105A800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Sep 4 21:37:48.979763 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979768 kernel: ACPI: SSDT 0xFFFF96CB41042300 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Sep 4 21:37:48.979773 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979778 kernel: ACPI: SSDT 0xFFFF96CB41059800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Sep 4 21:37:48.979784 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979789 kernel: ACPI: SSDT 0xFFFF96CB4106F000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Sep 4 21:37:48.979794 kernel: ACPI: Dynamic OEM Table Load: Sep 4 21:37:48.979799 kernel: ACPI: SSDT 0xFFFF96CB41776C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Sep 4 21:37:48.979804 kernel: ACPI: _OSC evaluated successfully for all CPUs Sep 4 21:37:48.979810 kernel: ACPI: Interpreter enabled Sep 4 21:37:48.979815 kernel: ACPI: PM: (supports S0 S5) Sep 4 21:37:48.979820 kernel: ACPI: Using IOAPIC for interrupt routing Sep 4 21:37:48.979826 kernel: HEST: Enabling Firmware First mode for corrected errors. Sep 4 21:37:48.979831 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Sep 4 21:37:48.979836 kernel: HEST: Table parsing has been initialized. Sep 4 21:37:48.979841 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Sep 4 21:37:48.979846 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 4 21:37:48.979851 kernel: PCI: Using E820 reservations for host bridge windows Sep 4 21:37:48.979858 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Sep 4 21:37:48.979863 kernel: ACPI: \_SB_.PCI0.XDCI.USBC: New power resource Sep 4 21:37:48.979868 kernel: ACPI: \_SB_.PCI0.SAT0.VOL0.V0PR: New power resource Sep 4 21:37:48.979874 kernel: ACPI: \_SB_.PCI0.SAT0.VOL1.V1PR: New power resource Sep 4 21:37:48.979879 kernel: ACPI: \_SB_.PCI0.SAT0.VOL2.V2PR: New power resource Sep 4 21:37:48.979884 kernel: ACPI: \_SB_.PCI0.CNVW.WRST: New power resource Sep 4 21:37:48.979889 kernel: ACPI: \_TZ_.FN00: New power resource Sep 4 21:37:48.979894 kernel: ACPI: \_TZ_.FN01: New power resource Sep 4 21:37:48.979900 kernel: ACPI: \_TZ_.FN02: New power resource Sep 4 21:37:48.979906 kernel: ACPI: \_TZ_.FN03: New power resource Sep 4 21:37:48.979911 kernel: ACPI: \_TZ_.FN04: New power resource Sep 4 21:37:48.979916 kernel: ACPI: \PIN_: New power resource Sep 4 21:37:48.979921 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Sep 4 21:37:48.979996 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 4 21:37:48.980050 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Sep 4 21:37:48.980096 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Sep 4 21:37:48.980104 kernel: PCI host bridge to bus 0000:00 Sep 4 21:37:48.980155 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 4 21:37:48.980197 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 4 21:37:48.980239 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 4 21:37:48.980279 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Sep 4 21:37:48.980321 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Sep 4 21:37:48.980362 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Sep 4 21:37:48.980419 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Sep 4 21:37:48.980477 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Sep 4 21:37:48.980526 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.980579 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Sep 4 21:37:48.980626 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Sep 4 21:37:48.980717 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Sep 4 21:37:48.980766 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Sep 4 21:37:48.980819 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Sep 4 21:37:48.980866 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Sep 4 21:37:48.980913 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Sep 4 21:37:48.980963 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Sep 4 21:37:48.981010 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Sep 4 21:37:48.981056 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Sep 4 21:37:48.981110 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Sep 4 21:37:48.981157 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 4 21:37:48.981207 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Sep 4 21:37:48.981255 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 4 21:37:48.981308 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Sep 4 21:37:48.981355 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Sep 4 21:37:48.981403 kernel: pci 0000:00:16.0: PME# supported from D3hot Sep 4 21:37:48.981454 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Sep 4 21:37:48.981508 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Sep 4 21:37:48.981557 kernel: pci 0000:00:16.1: PME# supported from D3hot Sep 4 21:37:48.981607 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Sep 4 21:37:48.981656 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Sep 4 21:37:48.981737 kernel: pci 0000:00:16.4: PME# supported from D3hot Sep 4 21:37:48.981788 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Sep 4 21:37:48.981834 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Sep 4 21:37:48.981881 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Sep 4 21:37:48.981926 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Sep 4 21:37:48.981974 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Sep 4 21:37:48.982019 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Sep 4 21:37:48.982067 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Sep 4 21:37:48.982116 kernel: pci 0000:00:17.0: PME# supported from D3hot Sep 4 21:37:48.982171 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Sep 4 21:37:48.982220 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982272 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Sep 4 21:37:48.982322 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982376 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Sep 4 21:37:48.982424 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982475 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Sep 4 21:37:48.982524 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982577 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Sep 4 21:37:48.982626 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.982711 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Sep 4 21:37:48.982760 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 4 21:37:48.982810 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Sep 4 21:37:48.982862 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Sep 4 21:37:48.982912 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Sep 4 21:37:48.982959 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Sep 4 21:37:48.983012 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Sep 4 21:37:48.983059 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Sep 4 21:37:48.983114 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Sep 4 21:37:48.983163 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Sep 4 21:37:48.983212 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Sep 4 21:37:48.983262 kernel: pci 0000:01:00.0: PME# supported from D3cold Sep 4 21:37:48.983311 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Sep 4 21:37:48.983360 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Sep 4 21:37:48.983414 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Sep 4 21:37:48.983464 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Sep 4 21:37:48.983511 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Sep 4 21:37:48.983561 kernel: pci 0000:01:00.1: PME# supported from D3cold Sep 4 21:37:48.983612 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Sep 4 21:37:48.983663 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Sep 4 21:37:48.983745 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 4 21:37:48.983794 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Sep 4 21:37:48.983840 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Sep 4 21:37:48.983888 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Sep 4 21:37:48.983942 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Sep 4 21:37:48.983993 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Sep 4 21:37:48.984042 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Sep 4 21:37:48.984090 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Sep 4 21:37:48.984139 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Sep 4 21:37:48.984186 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.984235 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Sep 4 21:37:48.984281 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Sep 4 21:37:48.984329 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Sep 4 21:37:48.984385 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Sep 4 21:37:48.984434 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Sep 4 21:37:48.984483 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Sep 4 21:37:48.984531 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Sep 4 21:37:48.984580 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Sep 4 21:37:48.984626 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Sep 4 21:37:48.984697 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Sep 4 21:37:48.984762 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Sep 4 21:37:48.984810 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Sep 4 21:37:48.984857 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Sep 4 21:37:48.984912 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Sep 4 21:37:48.984962 kernel: pci 0000:06:00.0: enabling Extended Tags Sep 4 21:37:48.985011 kernel: pci 0000:06:00.0: supports D1 D2 Sep 4 21:37:48.985059 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 4 21:37:48.985107 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Sep 4 21:37:48.985158 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Sep 4 21:37:48.985204 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Sep 4 21:37:48.985259 kernel: pci_bus 0000:07: extended config space not accessible Sep 4 21:37:48.985314 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Sep 4 21:37:48.985366 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Sep 4 21:37:48.985416 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Sep 4 21:37:48.985466 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Sep 4 21:37:48.985519 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 4 21:37:48.985569 kernel: pci 0000:07:00.0: supports D1 D2 Sep 4 21:37:48.985620 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 4 21:37:48.985697 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Sep 4 21:37:48.985759 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Sep 4 21:37:48.985808 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Sep 4 21:37:48.985816 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Sep 4 21:37:48.985824 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Sep 4 21:37:48.985830 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Sep 4 21:37:48.985835 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Sep 4 21:37:48.985841 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Sep 4 21:37:48.985846 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Sep 4 21:37:48.985852 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Sep 4 21:37:48.985857 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Sep 4 21:37:48.985863 kernel: iommu: Default domain type: Translated Sep 4 21:37:48.985869 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 4 21:37:48.985875 kernel: PCI: Using ACPI for IRQ routing Sep 4 21:37:48.985881 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 4 21:37:48.985886 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Sep 4 21:37:48.985892 kernel: e820: reserve RAM buffer [mem 0x81b2d000-0x83ffffff] Sep 4 21:37:48.985897 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Sep 4 21:37:48.985903 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Sep 4 21:37:48.985908 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Sep 4 21:37:48.985913 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Sep 4 21:37:48.985962 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Sep 4 21:37:48.986015 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Sep 4 21:37:48.986065 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 4 21:37:48.986073 kernel: vgaarb: loaded Sep 4 21:37:48.986079 kernel: clocksource: Switched to clocksource tsc-early Sep 4 21:37:48.986084 kernel: VFS: Disk quotas dquot_6.6.0 Sep 4 21:37:48.986091 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 4 21:37:48.986097 kernel: pnp: PnP ACPI init Sep 4 21:37:48.986146 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Sep 4 21:37:48.986198 kernel: pnp 00:02: [dma 0 disabled] Sep 4 21:37:48.986246 kernel: pnp 00:03: [dma 0 disabled] Sep 4 21:37:48.986294 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Sep 4 21:37:48.986337 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Sep 4 21:37:48.986386 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Sep 4 21:37:48.986432 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Sep 4 21:37:48.986478 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Sep 4 21:37:48.986522 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Sep 4 21:37:48.986565 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Sep 4 21:37:48.986607 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Sep 4 21:37:48.986649 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Sep 4 21:37:48.986739 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Sep 4 21:37:48.986783 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Sep 4 21:37:48.986828 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Sep 4 21:37:48.986875 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Sep 4 21:37:48.986921 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Sep 4 21:37:48.986965 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Sep 4 21:37:48.987008 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Sep 4 21:37:48.987051 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Sep 4 21:37:48.987094 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Sep 4 21:37:48.987142 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Sep 4 21:37:48.987151 kernel: pnp: PnP ACPI: found 10 devices Sep 4 21:37:48.987157 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 4 21:37:48.987163 kernel: NET: Registered PF_INET protocol family Sep 4 21:37:48.987168 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 4 21:37:48.987174 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 4 21:37:48.987179 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 4 21:37:48.987185 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 4 21:37:48.987191 kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Sep 4 21:37:48.987198 kernel: TCP: Hash tables configured (established 262144 bind 65536) Sep 4 21:37:48.987204 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Sep 4 21:37:48.987209 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Sep 4 21:37:48.987215 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 4 21:37:48.987220 kernel: NET: Registered PF_XDP protocol family Sep 4 21:37:48.987269 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Sep 4 21:37:48.987319 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Sep 4 21:37:48.987367 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Sep 4 21:37:48.987419 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Sep 4 21:37:48.987469 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Sep 4 21:37:48.987519 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Sep 4 21:37:48.987570 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Sep 4 21:37:48.987619 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 4 21:37:48.987686 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Sep 4 21:37:48.987755 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Sep 4 21:37:48.987802 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Sep 4 21:37:48.987852 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Sep 4 21:37:48.987900 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Sep 4 21:37:48.987949 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Sep 4 21:37:48.987996 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Sep 4 21:37:48.988044 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Sep 4 21:37:48.988093 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Sep 4 21:37:48.988141 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Sep 4 21:37:48.988189 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Sep 4 21:37:48.988238 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Sep 4 21:37:48.988287 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Sep 4 21:37:48.988334 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Sep 4 21:37:48.988384 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Sep 4 21:37:48.988430 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Sep 4 21:37:48.988475 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Sep 4 21:37:48.988520 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 4 21:37:48.988563 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 4 21:37:48.988604 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 4 21:37:48.988647 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Sep 4 21:37:48.988734 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Sep 4 21:37:48.988783 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Sep 4 21:37:48.988827 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Sep 4 21:37:48.988880 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Sep 4 21:37:48.988924 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Sep 4 21:37:48.988973 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Sep 4 21:37:48.989017 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Sep 4 21:37:48.989065 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Sep 4 21:37:48.989108 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Sep 4 21:37:48.989157 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Sep 4 21:37:48.989202 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Sep 4 21:37:48.989211 kernel: PCI: CLS 64 bytes, default 64 Sep 4 21:37:48.989216 kernel: DMAR: No ATSR found Sep 4 21:37:48.989222 kernel: DMAR: No SATC found Sep 4 21:37:48.989228 kernel: DMAR: dmar0: Using Queued invalidation Sep 4 21:37:48.989274 kernel: pci 0000:00:00.0: Adding to iommu group 0 Sep 4 21:37:48.989323 kernel: pci 0000:00:01.0: Adding to iommu group 1 Sep 4 21:37:48.989373 kernel: pci 0000:00:08.0: Adding to iommu group 2 Sep 4 21:37:48.989421 kernel: pci 0000:00:12.0: Adding to iommu group 3 Sep 4 21:37:48.989468 kernel: pci 0000:00:14.0: Adding to iommu group 4 Sep 4 21:37:48.989516 kernel: pci 0000:00:14.2: Adding to iommu group 4 Sep 4 21:37:48.989562 kernel: pci 0000:00:15.0: Adding to iommu group 5 Sep 4 21:37:48.989610 kernel: pci 0000:00:15.1: Adding to iommu group 5 Sep 4 21:37:48.989682 kernel: pci 0000:00:16.0: Adding to iommu group 6 Sep 4 21:37:48.989751 kernel: pci 0000:00:16.1: Adding to iommu group 6 Sep 4 21:37:48.989797 kernel: pci 0000:00:16.4: Adding to iommu group 6 Sep 4 21:37:48.989847 kernel: pci 0000:00:17.0: Adding to iommu group 7 Sep 4 21:37:48.989895 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Sep 4 21:37:48.989942 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Sep 4 21:37:48.989988 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Sep 4 21:37:48.990036 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Sep 4 21:37:48.990084 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Sep 4 21:37:48.990131 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Sep 4 21:37:48.990178 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Sep 4 21:37:48.990228 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Sep 4 21:37:48.990275 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Sep 4 21:37:48.990324 kernel: pci 0000:01:00.0: Adding to iommu group 1 Sep 4 21:37:48.990374 kernel: pci 0000:01:00.1: Adding to iommu group 1 Sep 4 21:37:48.990423 kernel: pci 0000:03:00.0: Adding to iommu group 15 Sep 4 21:37:48.990473 kernel: pci 0000:04:00.0: Adding to iommu group 16 Sep 4 21:37:48.990522 kernel: pci 0000:06:00.0: Adding to iommu group 17 Sep 4 21:37:48.990573 kernel: pci 0000:07:00.0: Adding to iommu group 17 Sep 4 21:37:48.990583 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Sep 4 21:37:48.990589 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 4 21:37:48.990594 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Sep 4 21:37:48.990600 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Sep 4 21:37:48.990606 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Sep 4 21:37:48.990611 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Sep 4 21:37:48.990617 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Sep 4 21:37:48.990695 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Sep 4 21:37:48.990726 kernel: Initialise system trusted keyrings Sep 4 21:37:48.990732 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Sep 4 21:37:48.990737 kernel: Key type asymmetric registered Sep 4 21:37:48.990743 kernel: Asymmetric key parser 'x509' registered Sep 4 21:37:48.990748 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Sep 4 21:37:48.990754 kernel: io scheduler mq-deadline registered Sep 4 21:37:48.990759 kernel: io scheduler kyber registered Sep 4 21:37:48.990765 kernel: io scheduler bfq registered Sep 4 21:37:48.990812 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Sep 4 21:37:48.990863 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Sep 4 21:37:48.990913 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Sep 4 21:37:48.990963 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Sep 4 21:37:48.991010 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Sep 4 21:37:48.991058 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Sep 4 21:37:48.991109 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Sep 4 21:37:48.991118 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Sep 4 21:37:48.991126 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Sep 4 21:37:48.991131 kernel: pstore: Using crash dump compression: deflate Sep 4 21:37:48.991137 kernel: pstore: Registered erst as persistent store backend Sep 4 21:37:48.991142 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 4 21:37:48.991148 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 4 21:37:48.991154 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 4 21:37:48.991159 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 4 21:37:48.991165 kernel: hpet_acpi_add: no address or irqs in _CRS Sep 4 21:37:48.991215 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Sep 4 21:37:48.991225 kernel: i8042: PNP: No PS/2 controller found. Sep 4 21:37:48.991268 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Sep 4 21:37:48.991312 kernel: rtc_cmos rtc_cmos: registered as rtc0 Sep 4 21:37:48.991355 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-09-04T21:37:47 UTC (1725485867) Sep 4 21:37:48.991399 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Sep 4 21:37:48.991407 kernel: intel_pstate: Intel P-state driver initializing Sep 4 21:37:48.991413 kernel: intel_pstate: Disabling energy efficiency optimization Sep 4 21:37:48.991418 kernel: intel_pstate: HWP enabled Sep 4 21:37:48.991425 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Sep 4 21:37:48.991431 kernel: vesafb: scrolling: redraw Sep 4 21:37:48.991436 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Sep 4 21:37:48.991442 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000028ef7f9a, using 768k, total 768k Sep 4 21:37:48.991448 kernel: Console: switching to colour frame buffer device 128x48 Sep 4 21:37:48.991454 kernel: fb0: VESA VGA frame buffer device Sep 4 21:37:48.991459 kernel: NET: Registered PF_INET6 protocol family Sep 4 21:37:48.991465 kernel: Segment Routing with IPv6 Sep 4 21:37:48.991470 kernel: In-situ OAM (IOAM) with IPv6 Sep 4 21:37:48.991477 kernel: NET: Registered PF_PACKET protocol family Sep 4 21:37:48.991482 kernel: Key type dns_resolver registered Sep 4 21:37:48.991488 kernel: microcode: Microcode Update Driver: v2.2. Sep 4 21:37:48.991493 kernel: IPI shorthand broadcast: enabled Sep 4 21:37:48.991499 kernel: sched_clock: Marking stable (2475000619, 1380690219)->(4390280870, -534590032) Sep 4 21:37:48.991504 kernel: registered taskstats version 1 Sep 4 21:37:48.991510 kernel: Loading compiled-in X.509 certificates Sep 4 21:37:48.991515 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.6.48-flatcar: a53bb4e7e3319f75620f709d8a6c7aef0adb3b02' Sep 4 21:37:48.991521 kernel: Key type .fscrypt registered Sep 4 21:37:48.991527 kernel: Key type fscrypt-provisioning registered Sep 4 21:37:48.991533 kernel: ima: Allocated hash algorithm: sha1 Sep 4 21:37:48.991538 kernel: ima: No architecture policies found Sep 4 21:37:48.991544 kernel: clk: Disabling unused clocks Sep 4 21:37:48.991549 kernel: Freeing unused kernel image (initmem) memory: 49336K Sep 4 21:37:48.991555 kernel: Write protecting the kernel read-only data: 36864k Sep 4 21:37:48.991560 kernel: Freeing unused kernel image (rodata/data gap) memory: 1936K Sep 4 21:37:48.991566 kernel: Run /init as init process Sep 4 21:37:48.991571 kernel: with arguments: Sep 4 21:37:48.991578 kernel: /init Sep 4 21:37:48.991583 kernel: with environment: Sep 4 21:37:48.991589 kernel: HOME=/ Sep 4 21:37:48.991594 kernel: TERM=linux Sep 4 21:37:48.991599 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 4 21:37:48.991606 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) Sep 4 21:37:48.991613 systemd[1]: Detected architecture x86-64. Sep 4 21:37:48.991620 systemd[1]: Running in initrd. Sep 4 21:37:48.991626 systemd[1]: No hostname configured, using default hostname. Sep 4 21:37:48.991631 systemd[1]: Hostname set to . Sep 4 21:37:48.991637 systemd[1]: Initializing machine ID from random generator. Sep 4 21:37:48.991643 systemd[1]: Queued start job for default target initrd.target. Sep 4 21:37:48.991649 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 4 21:37:48.991657 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 4 21:37:48.991664 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Sep 4 21:37:48.991695 systemd[1]: Expecting device dev-disk-by\x2dlabel-ROOT.device - /dev/disk/by-label/ROOT... Sep 4 21:37:48.991701 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-ROOT.device - /dev/disk/by-partlabel/ROOT... Sep 4 21:37:48.991727 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-USR\x2dA.device - /dev/disk/by-partlabel/USR-A... Sep 4 21:37:48.991734 systemd[1]: Expecting device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132... Sep 4 21:37:48.991740 systemd[1]: Expecting device dev-mapper-usr.device - /dev/mapper/usr... Sep 4 21:37:48.991745 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Sep 4 21:37:48.991751 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Sep 4 21:37:48.991758 kernel: clocksource: Switched to clocksource tsc Sep 4 21:37:48.991764 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 4 21:37:48.991770 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Sep 4 21:37:48.991776 systemd[1]: Reached target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Sep 4 21:37:48.991781 systemd[1]: Reached target paths.target - Path Units. Sep 4 21:37:48.991787 systemd[1]: Reached target slices.target - Slice Units. Sep 4 21:37:48.991793 systemd[1]: Reached target swap.target - Swaps. Sep 4 21:37:48.991799 systemd[1]: Reached target timers.target - Timer Units. Sep 4 21:37:48.991805 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket. Sep 4 21:37:48.991812 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket. Sep 4 21:37:48.991818 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Sep 4 21:37:48.991823 systemd[1]: Listening on systemd-journald.socket - Journal Socket. Sep 4 21:37:48.991829 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Sep 4 21:37:48.991835 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Sep 4 21:37:48.991841 systemd[1]: Reached target sockets.target - Socket Units. Sep 4 21:37:48.991847 systemd[1]: Starting ignition-setup-pre.service - Ignition env setup... Sep 4 21:37:48.991853 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Sep 4 21:37:48.991860 systemd[1]: Starting systemd-fsck-usr.service... Sep 4 21:37:48.991865 systemd[1]: Starting systemd-journald.service - Journal Service... Sep 4 21:37:48.991882 systemd-journald[258]: Collecting audit messages is disabled. Sep 4 21:37:48.991896 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Sep 4 21:37:48.991904 systemd-journald[258]: Journal started Sep 4 21:37:48.991917 systemd-journald[258]: Runtime Journal (/run/log/journal/b3fb8d1a498341df9504f553b5ac8d23) is 8.0M, max 639.9M, 631.9M free. Sep 4 21:37:49.027513 systemd-modules-load[259]: Inserted module 'overlay' Sep 4 21:37:49.036834 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 4 21:37:49.057659 systemd[1]: Started systemd-journald.service - Journal Service. Sep 4 21:37:49.057808 systemd[1]: Finished ignition-setup-pre.service - Ignition env setup. Sep 4 21:37:49.129900 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 4 21:37:49.129913 kernel: Bridge firewalling registered Sep 4 21:37:49.113843 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Sep 4 21:37:49.119153 systemd-modules-load[259]: Inserted module 'br_netfilter' Sep 4 21:37:49.140971 systemd[1]: Finished systemd-fsck-usr.service. Sep 4 21:37:49.151997 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Sep 4 21:37:49.166069 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 4 21:37:49.210933 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 4 21:37:49.216519 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Sep 4 21:37:49.237329 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully... Sep 4 21:37:49.237728 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Sep 4 21:37:49.241168 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Sep 4 21:37:49.242669 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Sep 4 21:37:49.243405 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Sep 4 21:37:49.244753 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Sep 4 21:37:49.249014 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 4 21:37:49.261036 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 4 21:37:49.297951 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Sep 4 21:37:49.317791 dracut-cmdline[295]: dracut-dracut-053 Sep 4 21:37:49.317791 dracut-cmdline[295]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf Sep 4 21:37:49.446687 kernel: SCSI subsystem initialized Sep 4 21:37:49.470659 kernel: Loading iSCSI transport class v2.0-870. Sep 4 21:37:49.494706 kernel: iscsi: registered transport (tcp) Sep 4 21:37:49.530230 kernel: iscsi: registered transport (qla4xxx) Sep 4 21:37:49.530249 kernel: QLogic iSCSI HBA Driver Sep 4 21:37:49.564138 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Sep 4 21:37:49.593966 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Sep 4 21:37:49.656508 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 4 21:37:49.656528 kernel: device-mapper: uevent: version 1.0.3 Sep 4 21:37:49.676289 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@redhat.com Sep 4 21:37:49.737740 kernel: raid6: avx2x4 gen() 53958 MB/s Sep 4 21:37:49.769719 kernel: raid6: avx2x2 gen() 55000 MB/s Sep 4 21:37:49.806350 kernel: raid6: avx2x1 gen() 45354 MB/s Sep 4 21:37:49.806368 kernel: raid6: using algorithm avx2x2 gen() 55000 MB/s Sep 4 21:37:49.854268 kernel: raid6: .... xor() 30762 MB/s, rmw enabled Sep 4 21:37:49.854286 kernel: raid6: using avx2x2 recovery algorithm Sep 4 21:37:49.898693 kernel: xor: automatically using best checksumming function avx Sep 4 21:37:50.024689 kernel: Btrfs loaded, zoned=no, fsverity=no Sep 4 21:37:50.030215 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Sep 4 21:37:50.054019 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 4 21:37:50.060319 systemd-udevd[484]: Using default interface naming scheme 'v255'. Sep 4 21:37:50.064824 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 4 21:37:50.093881 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Sep 4 21:37:50.145035 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Sep 4 21:37:50.162853 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Sep 4 21:37:50.190979 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Sep 4 21:37:50.280308 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Sep 4 21:37:50.306031 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 4 21:37:50.325723 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 4 21:37:50.325760 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 4 21:37:50.306133 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 4 21:37:50.406906 kernel: cryptd: max_cpu_qlen set to 1000 Sep 4 21:37:50.406928 kernel: ACPI: bus type USB registered Sep 4 21:37:50.406940 kernel: usbcore: registered new interface driver usbfs Sep 4 21:37:50.406954 kernel: usbcore: registered new interface driver hub Sep 4 21:37:50.406971 kernel: usbcore: registered new device driver usb Sep 4 21:37:50.406962 systemd[1]: Stopping dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 4 21:37:50.439732 kernel: PTP clock support registered Sep 4 21:37:50.439750 kernel: libata version 3.00 loaded. Sep 4 21:37:50.439759 kernel: AVX2 version of gcm_enc/dec engaged. Sep 4 21:37:50.421718 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 4 21:37:50.449233 kernel: AES CTR mode by8 optimization enabled Sep 4 21:37:50.421850 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Sep 4 21:37:51.198699 kernel: ahci 0000:00:17.0: version 3.0 Sep 4 21:37:51.198809 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Sep 4 21:37:51.198887 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Sep 4 21:37:51.198960 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Sep 4 21:37:51.199032 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Sep 4 21:37:51.199106 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Sep 4 21:37:51.199177 kernel: scsi host0: ahci Sep 4 21:37:51.199251 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Sep 4 21:37:51.199321 kernel: scsi host1: ahci Sep 4 21:37:51.199391 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Sep 4 21:37:51.199462 kernel: scsi host2: ahci Sep 4 21:37:51.199530 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Sep 4 21:37:51.199603 kernel: hub 1-0:1.0: USB hub found Sep 4 21:37:51.199922 kernel: scsi host3: ahci Sep 4 21:37:51.199992 kernel: hub 1-0:1.0: 16 ports detected Sep 4 21:37:51.200070 kernel: scsi host4: ahci Sep 4 21:37:51.200138 kernel: hub 2-0:1.0: USB hub found Sep 4 21:37:51.200218 kernel: scsi host5: ahci Sep 4 21:37:51.200287 kernel: hub 2-0:1.0: 10 ports detected Sep 4 21:37:51.200365 kernel: scsi host6: ahci Sep 4 21:37:51.200436 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Sep 4 21:37:51.200446 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Sep 4 21:37:51.200455 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Sep 4 21:37:51.200464 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Sep 4 21:37:51.200473 kernel: pps pps0: new PPS source ptp0 Sep 4 21:37:51.200543 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Sep 4 21:37:51.200556 kernel: igb 0000:03:00.0: added PHC on eth0 Sep 4 21:37:51.200635 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Sep 4 21:37:51.200645 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Sep 4 21:37:51.200724 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Sep 4 21:37:51.200734 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:7a Sep 4 21:37:51.200806 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Sep 4 21:37:51.200816 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Sep 4 21:37:51.200887 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Sep 4 21:37:51.200899 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Sep 4 21:37:51.200971 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Sep 4 21:37:51.201313 kernel: pps pps1: new PPS source ptp1 Sep 4 21:37:51.201382 kernel: hub 1-14:1.0: USB hub found Sep 4 21:37:51.201465 kernel: igb 0000:04:00.0: added PHC on eth1 Sep 4 21:37:51.201542 kernel: hub 1-14:1.0: 4 ports detected Sep 4 21:37:51.201621 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Sep 4 21:37:51.201699 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Sep 4 21:37:51.201710 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:7b Sep 4 21:37:51.201781 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:51.201792 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Sep 4 21:37:51.201863 kernel: ata3: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:51.201873 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Sep 4 21:37:51.201945 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Sep 4 21:37:51.201954 kernel: ata7: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:50.506739 systemd[1]: Stopping systemd-vconsole-setup.service - Virtual Console Setup... Sep 4 21:37:51.243497 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Sep 4 21:37:51.243509 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:51.243521 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 4 21:37:51.259708 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Sep 4 21:37:51.284656 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Sep 4 21:37:51.284678 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Sep 4 21:37:51.321713 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Sep 4 21:37:51.321743 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Sep 4 21:37:51.322913 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 4 21:37:51.434091 kernel: ata1.00: Features: NCQ-prio Sep 4 21:37:51.434106 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Sep 4 21:37:51.434205 kernel: ata2.00: Features: NCQ-prio Sep 4 21:37:51.434214 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 4 21:37:51.434222 kernel: ata1.00: configured for UDMA/133 Sep 4 21:37:51.434229 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Sep 4 21:37:51.434300 kernel: ata2.00: configured for UDMA/133 Sep 4 21:37:51.459708 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Sep 4 21:37:51.479038 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 4 21:37:51.508777 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Sep 4 21:37:51.508867 kernel: usbcore: registered new interface driver usbhid Sep 4 21:37:51.514664 kernel: usbhid: USB HID core driver Sep 4 21:37:51.531827 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 4 21:37:51.581166 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Sep 4 21:37:51.581177 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Sep 4 21:37:51.592741 kernel: ata2.00: Enabling discard_zeroes_data Sep 4 21:37:51.592760 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Sep 4 21:37:51.592847 kernel: ata1.00: Enabling discard_zeroes_data Sep 4 21:37:51.592856 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Sep 4 21:37:51.592932 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Sep 4 21:37:51.594718 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Sep 4 21:37:51.594811 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Sep 4 21:37:51.594824 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Sep 4 21:37:51.606618 kernel: mlx5_core 0000:01:00.0: Port module event: module 0, Cable plugged Sep 4 21:37:51.606716 kernel: sd 1:0:0:0: [sdb] Write Protect is off Sep 4 21:37:51.606797 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Sep 4 21:37:51.606861 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 4 21:37:51.606923 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 4 21:37:51.606982 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Sep 4 21:37:51.607043 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Sep 4 21:37:51.607103 kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes Sep 4 21:37:51.607161 kernel: ata1.00: Enabling discard_zeroes_data Sep 4 21:37:51.608702 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 4 21:37:51.609697 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 4 21:37:51.614275 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 4 21:37:52.180591 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (533) Sep 4 21:37:52.180613 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Sep 4 21:37:52.180708 kernel: BTRFS: device fsid d110be6f-93a3-451a-b365-11b5d04e0602 devid 1 transid 33 /dev/sda3 scanned by (udev-worker) (530) Sep 4 21:37:52.180717 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Sep 4 21:37:52.180781 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic) Sep 4 21:37:52.180855 kernel: sd 1:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Sep 4 21:37:52.180915 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Sep 4 21:37:52.180982 kernel: ata2.00: Enabling discard_zeroes_data Sep 4 21:37:52.180990 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Sep 4 21:37:52.181053 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Sep 4 21:37:52.181113 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Sep 4 21:37:52.206766 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Sep 4 21:37:52.222797 systemd[1]: Found device dev-disk-by\x2dpartlabel-ROOT.device - Micron_5300_MTFDDAK480TDT ROOT. Sep 4 21:37:52.233837 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Micron_5300_MTFDDAK480TDT ROOT. Sep 4 21:37:52.244734 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5300_MTFDDAK480TDT OEM. Sep 4 21:37:52.281386 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Micron_5300_MTFDDAK480TDT USR-A. Sep 4 21:37:52.298832 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Micron_5300_MTFDDAK480TDT USR-A. Sep 4 21:37:52.337113 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Sep 4 21:37:52.366928 systemd[1]: Starting decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition... Sep 4 21:37:52.379512 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary... Sep 4 21:37:52.393522 systemd[1]: Finished decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition. Sep 4 21:37:52.462757 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic) Sep 4 21:37:52.462877 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Sep 4 21:37:52.468144 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Sep 4 21:37:52.501795 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Sep 4 21:37:52.484871 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 4 21:37:52.484917 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary. Sep 4 21:37:52.515848 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Sep 4 21:37:52.521939 systemd[1]: Reached target local-fs.target - Local File Systems. Sep 4 21:37:52.549844 systemd[1]: Reached target sysinit.target - System Initialization. Sep 4 21:37:52.567836 systemd[1]: Reached target basic.target - Basic System. Sep 4 21:37:52.598026 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr... Sep 4 21:37:52.602630 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Sep 4 21:37:52.632962 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Sep 4 21:37:52.680852 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 4 21:37:52.659738 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 4 21:37:52.691745 systemd[1]: Reached target remote-fs.target - Remote File Systems. Sep 4 21:37:52.720792 sh[708]: Success Sep 4 21:37:52.726817 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Sep 4 21:37:52.730803 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr. Sep 4 21:37:52.765262 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Sep 4 21:37:52.775174 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr. Sep 4 21:37:52.823898 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr... Sep 4 21:37:52.832108 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT... Sep 4 21:37:52.988889 kernel: BTRFS info (device dm-0): first mount of filesystem d110be6f-93a3-451a-b365-11b5d04e0602 Sep 4 21:37:52.988903 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm Sep 4 21:37:52.988911 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead Sep 4 21:37:52.988919 kernel: BTRFS info (device dm-0): disabling log replay at mount time Sep 4 21:37:52.988926 kernel: BTRFS info (device dm-0): using free space tree Sep 4 21:37:52.988933 kernel: BTRFS info (device dm-0): enabling ssd optimizations Sep 4 21:37:52.975200 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr. Sep 4 21:37:53.016828 systemd-fsck[753]: ROOT: clean, 77/553520 files, 52714/553472 blocks Sep 4 21:37:53.027190 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT. Sep 4 21:37:53.044796 systemd[1]: Mounting sysroot.mount - /sysroot... Sep 4 21:37:53.158441 systemd[1]: Mounted sysroot.mount - /sysroot. Sep 4 21:37:53.174897 kernel: EXT4-fs (sda9): mounted filesystem 84a5cefa-c3c7-47d7-9305-7e6877f73628 r/w with ordered data mode. Quota mode: none. Sep 4 21:37:53.167130 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Sep 4 21:37:53.184886 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Sep 4 21:37:53.194784 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr... Sep 4 21:37:53.234659 kernel: BTRFS info (device sda6): first mount of filesystem 50e7422b-f0c7-4536-902a-3ab4c864240b Sep 4 21:37:53.234677 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 4 21:37:53.234710 kernel: BTRFS info (device sda6): using free space tree Sep 4 21:37:53.249001 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr. Sep 4 21:37:53.331841 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 4 21:37:53.331853 kernel: BTRFS info (device sda6): auto enabling async discard Sep 4 21:37:53.323496 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Sep 4 21:37:53.350888 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup... Sep 4 21:37:53.422883 initrd-setup-root[787]: cut: /sysroot/etc/passwd: No such file or directory Sep 4 21:37:53.432768 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory Sep 4 21:37:53.443723 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory Sep 4 21:37:53.453759 initrd-setup-root[808]: cut: /sysroot/etc/gshadow: No such file or directory Sep 4 21:37:53.523686 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup. Sep 4 21:37:53.547911 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion... Sep 4 21:37:53.562096 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion. Sep 4 21:37:53.581101 systemd[1]: Reached target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Sep 4 21:37:53.617117 initrd-setup-root-after-ignition[956]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 4 21:37:53.617117 initrd-setup-root-after-ignition[956]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory Sep 4 21:37:53.652867 initrd-setup-root-after-ignition[960]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 4 21:37:53.618049 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root... Sep 4 21:37:53.699457 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 4 21:37:53.699803 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root. Sep 4 21:37:53.719868 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Sep 4 21:37:53.741902 systemd[1]: Reached target initrd.target - Initrd Default Target. Sep 4 21:37:53.763108 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met. Sep 4 21:37:53.775024 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Sep 4 21:37:53.855472 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Sep 4 21:37:53.879049 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Sep 4 21:37:53.924633 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 4 21:37:53.935911 systemd[1]: Stopped target timers.target - Timer Units. Sep 4 21:37:53.955958 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 4 21:37:53.956073 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Sep 4 21:37:53.984110 systemd[1]: Stopped target initrd.target - Initrd Default Target. Sep 4 21:37:54.005225 systemd[1]: Stopped target basic.target - Basic System. Sep 4 21:37:54.025219 systemd[1]: Stopped target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Sep 4 21:37:54.044233 systemd[1]: Stopped target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Sep 4 21:37:54.069341 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Sep 4 21:37:54.093235 systemd[1]: Stopped target paths.target - Path Units. Sep 4 21:37:54.112339 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Sep 4 21:37:54.132247 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Sep 4 21:37:54.154375 systemd[1]: Stopped target slices.target - Slice Units. Sep 4 21:37:54.175226 systemd[1]: Stopped target sockets.target - Socket Units. Sep 4 21:37:54.193232 systemd[1]: Stopped target sysinit.target - System Initialization. Sep 4 21:37:54.211231 systemd[1]: Stopped target local-fs.target - Local File Systems. Sep 4 21:37:54.231220 systemd[1]: Stopped target swap.target - Swaps. Sep 4 21:37:54.250196 systemd[1]: iscsid.socket: Deactivated successfully. Sep 4 21:37:54.250471 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket. Sep 4 21:37:54.268305 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 4 21:37:54.268602 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket. Sep 4 21:37:54.288376 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 4 21:37:54.288781 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Sep 4 21:37:54.315391 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Sep 4 21:37:54.335141 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 4 21:37:54.335598 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 4 21:37:54.356282 systemd[1]: Stopped target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 4 21:37:54.378247 systemd[1]: clevis-luks-askpass.path: Deactivated successfully. Sep 4 21:37:54.378731 systemd[1]: Stopped clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 4 21:37:54.399148 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 4 21:37:54.399542 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Sep 4 21:37:54.433186 systemd[1]: decrypt-root.service: Deactivated successfully. Sep 4 21:37:54.433622 systemd[1]: Stopped decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition. Sep 4 21:37:54.457454 systemd[1]: ignition-setup-pre.service: Deactivated successfully. Sep 4 21:37:54.457862 systemd[1]: Stopped ignition-setup-pre.service - Ignition env setup. Sep 4 21:37:54.476338 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 4 21:37:54.476758 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion. Sep 4 21:37:54.501349 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 4 21:37:54.501755 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup. Sep 4 21:37:54.519252 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 4 21:37:54.519607 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Sep 4 21:37:54.540317 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 4 21:37:54.540727 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Sep 4 21:37:54.559348 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Sep 4 21:37:54.559753 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Sep 4 21:37:54.584327 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 4 21:37:54.584733 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Sep 4 21:37:54.605348 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 4 21:37:54.605755 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Sep 4 21:37:54.636786 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 4 21:37:54.664245 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 4 21:37:54.664577 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 4 21:37:54.684312 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 4 21:37:54.684535 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Sep 4 21:37:54.701912 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 4 21:37:54.702070 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Sep 4 21:37:54.718966 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 4 21:37:54.719064 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Sep 4 21:37:54.738972 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 4 21:37:54.739131 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Sep 4 21:37:54.769194 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 4 21:37:54.769363 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Sep 4 21:37:54.800169 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 4 21:37:55.092834 systemd-journald[258]: Received SIGTERM from PID 1 (systemd). Sep 4 21:37:54.800343 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 4 21:37:54.840926 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Sep 4 21:37:54.840951 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 4 21:37:54.841011 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 4 21:37:54.881913 systemd[1]: systemd-tmpfiles-setup-dev-early.service: Deactivated successfully. Sep 4 21:37:54.881982 systemd[1]: Stopped systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Sep 4 21:37:54.900998 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 4 21:37:54.901111 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Sep 4 21:37:54.925040 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 4 21:37:54.925201 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Sep 4 21:37:54.947124 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 4 21:37:54.947370 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Sep 4 21:37:54.969083 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Sep 4 21:37:55.004023 systemd[1]: Starting initrd-switch-root.service - Switch Root... Sep 4 21:37:55.027907 systemd[1]: Switching root. Sep 4 21:37:55.093209 systemd-journald[258]: Journal stopped Sep 4 21:37:57.695373 kernel: SELinux: policy capability network_peer_controls=1 Sep 4 21:37:57.695387 kernel: SELinux: policy capability open_perms=1 Sep 4 21:37:57.695394 kernel: SELinux: policy capability extended_socket_class=1 Sep 4 21:37:57.695401 kernel: SELinux: policy capability always_check_network=0 Sep 4 21:37:57.695406 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 4 21:37:57.695411 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 4 21:37:57.695416 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 4 21:37:57.695421 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 4 21:37:57.695427 kernel: audit: type=1403 audit(1725485875.300:2): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 4 21:37:57.695433 systemd[1]: Successfully loaded SELinux policy in 166.444ms. Sep 4 21:37:57.695441 systemd[1]: Relabeled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.978ms. Sep 4 21:37:57.695447 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) Sep 4 21:37:57.695453 systemd[1]: Detected architecture x86-64. Sep 4 21:37:57.695458 systemd[1]: Detected first boot. Sep 4 21:37:57.695465 systemd[1]: Hostname set to . Sep 4 21:37:57.695472 systemd[1]: Initializing machine ID from random generator. Sep 4 21:37:57.695478 zram_generator::config[1001]: No configuration found. Sep 4 21:37:57.695484 systemd[1]: Populated /etc with preset unit settings. Sep 4 21:37:57.695490 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 4 21:37:57.695496 systemd[1]: Stopped initrd-switch-root.service - Switch Root. Sep 4 21:37:57.695502 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 4 21:37:57.695508 systemd[1]: Created slice system-addon\x2dconfig.slice - Slice /system/addon-config. Sep 4 21:37:57.695515 systemd[1]: Created slice system-addon\x2drun.slice - Slice /system/addon-run. Sep 4 21:37:57.695521 systemd[1]: Created slice system-getty.slice - Slice /system/getty. Sep 4 21:37:57.695528 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Sep 4 21:37:57.695534 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Sep 4 21:37:57.695542 systemd[1]: Created slice system-system\x2dcloudinit.slice - Slice /system/system-cloudinit. Sep 4 21:37:57.695548 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Sep 4 21:37:57.695555 systemd[1]: Created slice user.slice - User and Session Slice. Sep 4 21:37:57.695562 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 4 21:37:57.695568 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 4 21:37:57.695574 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Sep 4 21:37:57.695580 systemd[1]: Set up automount boot.automount - Boot partition Automount Point. Sep 4 21:37:57.695586 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Sep 4 21:37:57.695593 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Sep 4 21:37:57.695599 systemd[1]: Expecting device dev-ttyS1.device - /dev/ttyS1... Sep 4 21:37:57.695605 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 4 21:37:57.695612 systemd[1]: Stopped target initrd-switch-root.target - Switch Root. Sep 4 21:37:57.695618 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems. Sep 4 21:37:57.695624 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System. Sep 4 21:37:57.695632 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Sep 4 21:37:57.695638 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 4 21:37:57.695645 systemd[1]: Reached target remote-fs.target - Remote File Systems. Sep 4 21:37:57.695651 systemd[1]: Reached target slices.target - Slice Units. Sep 4 21:37:57.695669 systemd[1]: Reached target swap.target - Swaps. Sep 4 21:37:57.695676 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Sep 4 21:37:57.695682 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket. Sep 4 21:37:57.695715 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Sep 4 21:37:57.695735 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Sep 4 21:37:57.695741 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Sep 4 21:37:57.695749 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket. Sep 4 21:37:57.695756 systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Sep 4 21:37:57.695762 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Sep 4 21:37:57.695768 systemd[1]: Mounting media.mount - External Media Directory... Sep 4 21:37:57.695775 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 4 21:37:57.695781 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Sep 4 21:37:57.695788 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Sep 4 21:37:57.695795 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... Sep 4 21:37:57.695802 systemd[1]: var-lib-machines.mount - Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 4 21:37:57.695808 systemd[1]: Reached target machines.target - Containers. Sep 4 21:37:57.695815 systemd[1]: Starting flatcar-tmpfiles.service - Create missing system files... Sep 4 21:37:57.695822 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Sep 4 21:37:57.695828 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Sep 4 21:37:57.695835 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Sep 4 21:37:57.695841 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Sep 4 21:37:57.695847 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Sep 4 21:37:57.695855 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Sep 4 21:37:57.695861 kernel: ACPI: bus type drm_connector registered Sep 4 21:37:57.695868 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Sep 4 21:37:57.695874 kernel: fuse: init (API version 7.39) Sep 4 21:37:57.695880 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Sep 4 21:37:57.695886 kernel: loop: module loaded Sep 4 21:37:57.695893 systemd[1]: setup-nsswitch.service - Create /etc/nsswitch.conf was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 4 21:37:57.695899 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 4 21:37:57.695907 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device. Sep 4 21:37:57.695913 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 4 21:37:57.695919 systemd[1]: Stopped systemd-fsck-usr.service. Sep 4 21:37:57.695926 systemd[1]: Starting systemd-journald.service - Journal Service... Sep 4 21:37:57.695940 systemd-journald[1100]: Collecting audit messages is disabled. Sep 4 21:37:57.695955 systemd-journald[1100]: Journal started Sep 4 21:37:57.695969 systemd-journald[1100]: Runtime Journal (/run/log/journal/0e8ed50beb1f4094a1a387d8a04b8bcb) is 8.0M, max 639.9M, 631.9M free. Sep 4 21:37:55.821385 systemd[1]: Queued start job for default target multi-user.target. Sep 4 21:37:55.841916 systemd[1]: Unnecessary job was removed for dev-sda6.device - /dev/sda6. Sep 4 21:37:55.842163 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 4 21:37:57.723704 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Sep 4 21:37:57.758709 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Sep 4 21:37:57.792712 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Sep 4 21:37:57.826828 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Sep 4 21:37:57.860374 systemd[1]: verity-setup.service: Deactivated successfully. Sep 4 21:37:57.860438 systemd[1]: Stopped verity-setup.service. Sep 4 21:37:57.922704 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 4 21:37:57.943859 systemd[1]: Started systemd-journald.service - Journal Service. Sep 4 21:37:57.953231 systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Sep 4 21:37:57.962927 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Sep 4 21:37:57.972933 systemd[1]: Mounted media.mount - External Media Directory. Sep 4 21:37:57.982917 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Sep 4 21:37:57.992892 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Sep 4 21:37:58.002898 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp. Sep 4 21:37:58.013024 systemd[1]: Finished flatcar-tmpfiles.service - Create missing system files. Sep 4 21:37:58.025087 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Sep 4 21:37:58.036446 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 4 21:37:58.036685 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Sep 4 21:37:58.048531 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 4 21:37:58.048917 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Sep 4 21:37:58.061598 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 4 21:37:58.061992 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Sep 4 21:37:58.072646 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 4 21:37:58.073039 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Sep 4 21:37:58.084584 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 4 21:37:58.084976 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Sep 4 21:37:58.095577 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 4 21:37:58.095969 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Sep 4 21:37:58.106786 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Sep 4 21:37:58.118746 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Sep 4 21:37:58.130576 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Sep 4 21:37:58.143552 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Sep 4 21:37:58.180780 systemd[1]: Reached target network-pre.target - Preparation for Network. Sep 4 21:37:58.205930 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Sep 4 21:37:58.216493 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Sep 4 21:37:58.226843 systemd[1]: remount-root.service - Remount Root File System was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 4 21:37:58.226867 systemd[1]: Reached target local-fs.target - Local File Systems. Sep 4 21:37:58.237685 systemd[1]: Listening on systemd-sysext.socket - System Extension Image Management (Varlink). Sep 4 21:37:58.265192 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown... Sep 4 21:37:58.277576 systemd[1]: Starting ldconfig.service - Rebuild Dynamic Linker Cache... Sep 4 21:37:58.287564 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Sep 4 21:37:58.289320 systemd[1]: Starting systemd-hwdb-update.service - Rebuild Hardware Database... Sep 4 21:37:58.299287 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Sep 4 21:37:58.309757 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 4 21:37:58.310427 systemd[1]: Starting systemd-random-seed.service - Load/Save OS Random Seed... Sep 4 21:37:58.315729 systemd-journald[1100]: Time spent on flushing to /var/log/journal/0e8ed50beb1f4094a1a387d8a04b8bcb is 10.095ms for 1138 entries. Sep 4 21:37:58.315729 systemd-journald[1100]: System Journal (/var/log/journal/0e8ed50beb1f4094a1a387d8a04b8bcb) is 8.0M, max 195.6M, 187.6M free. Sep 4 21:37:58.357331 systemd-journald[1100]: Received client request to flush runtime journal. Sep 4 21:37:58.327813 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Sep 4 21:37:58.328479 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Sep 4 21:37:58.338320 systemd[1]: Starting systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/... Sep 4 21:37:58.347549 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully... Sep 4 21:37:58.359530 systemd[1]: Starting systemd-udev-settle.service - Wait for udev To Complete Device Initialization... Sep 4 21:37:58.389498 kernel: loop0: detected capacity change from 0 to 8 Sep 4 21:37:58.389547 kernel: block loop0: the capability attribute has been deprecated. Sep 4 21:37:58.400702 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Sep 4 21:37:58.402817 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Sep 4 21:37:58.420037 systemd-tmpfiles[1133]: ACLs are not supported, ignoring. Sep 4 21:37:58.420048 systemd-tmpfiles[1133]: ACLs are not supported, ignoring. Sep 4 21:37:58.427660 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 4 21:37:58.439067 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown. Sep 4 21:37:58.449873 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Sep 4 21:37:58.460888 systemd[1]: Finished systemd-random-seed.service - Load/Save OS Random Seed. Sep 4 21:37:58.478313 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Sep 4 21:37:58.491700 kernel: loop1: detected capacity change from 0 to 80568 Sep 4 21:37:58.500830 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Sep 4 21:37:58.514800 systemd[1]: Reached target first-boot-complete.target - First Boot Complete. Sep 4 21:37:58.533867 systemd[1]: Starting systemd-machine-id-commit.service - Commit a transient machine-id on disk... Sep 4 21:37:58.545347 systemd[1]: Starting systemd-sysusers.service - Create System Users... Sep 4 21:37:58.567586 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 4 21:37:58.567683 kernel: loop2: detected capacity change from 0 to 139904 Sep 4 21:37:58.568063 systemd[1]: Finished systemd-machine-id-commit.service - Commit a transient machine-id on disk. Sep 4 21:37:58.579319 udevadm[1137]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 4 21:37:58.590054 systemd[1]: Finished systemd-sysusers.service - Create System Users. Sep 4 21:37:58.612812 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Sep 4 21:37:58.620787 systemd-tmpfiles[1157]: ACLs are not supported, ignoring. Sep 4 21:37:58.620797 systemd-tmpfiles[1157]: ACLs are not supported, ignoring. Sep 4 21:37:58.623944 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 4 21:37:58.643515 ldconfig[1127]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 4 21:37:58.645312 systemd[1]: Finished ldconfig.service - Rebuild Dynamic Linker Cache. Sep 4 21:37:58.649660 kernel: loop3: detected capacity change from 0 to 8 Sep 4 21:37:58.669718 kernel: loop4: detected capacity change from 0 to 80568 Sep 4 21:37:58.697810 kernel: loop5: detected capacity change from 0 to 139904 Sep 4 21:37:58.727643 (sd-merge)[1159]: Using extensions 'containerd-flatcar', 'docker-flatcar', 'oem-packet'. Sep 4 21:37:58.727881 (sd-merge)[1159]: Merged extensions into '/usr'. Sep 4 21:37:58.729262 systemd[1]: Finished systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/. Sep 4 21:37:58.740173 systemd[1]: Finished systemd-hwdb-update.service - Rebuild Hardware Database. Sep 4 21:37:58.769001 systemd[1]: Starting ensure-sysext.service... Sep 4 21:37:58.776441 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Sep 4 21:37:58.788634 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 4 21:37:58.797706 systemd-tmpfiles[1165]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 4 21:37:58.797986 systemd-tmpfiles[1165]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Sep 4 21:37:58.798642 systemd-tmpfiles[1165]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 4 21:37:58.798877 systemd-tmpfiles[1165]: ACLs are not supported, ignoring. Sep 4 21:37:58.798924 systemd-tmpfiles[1165]: ACLs are not supported, ignoring. Sep 4 21:37:58.802536 systemd[1]: Reloading requested from client PID 1164 ('systemctl') (unit ensure-sysext.service)... Sep 4 21:37:58.802543 systemd[1]: Reloading... Sep 4 21:37:58.805942 systemd-tmpfiles[1165]: Detected autofs mount point /boot during canonicalization of boot. Sep 4 21:37:58.805947 systemd-tmpfiles[1165]: Skipping /boot Sep 4 21:37:58.810058 systemd-tmpfiles[1165]: Detected autofs mount point /boot during canonicalization of boot. Sep 4 21:37:58.810062 systemd-tmpfiles[1165]: Skipping /boot Sep 4 21:37:58.815563 systemd-udevd[1166]: Using default interface naming scheme 'v255'. Sep 4 21:37:58.841668 zram_generator::config[1191]: No configuration found. Sep 4 21:37:58.871754 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Sep 4 21:37:58.871820 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 33 scanned by (udev-worker) (1278) Sep 4 21:37:58.871851 kernel: ACPI: button: Sleep Button [SLPB] Sep 4 21:37:58.884361 kernel: BTRFS info: devid 1 device path /dev/mapper/usr changed to /dev/dm-0 scanned by (udev-worker) (1220) Sep 4 21:37:58.884432 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Sep 4 21:37:58.955713 kernel: mousedev: PS/2 mouse device common for all mice Sep 4 21:37:58.960660 kernel: ACPI: button: Power Button [PWRF] Sep 4 21:37:58.990660 kernel: IPMI message handler: version 39.2 Sep 4 21:37:59.022663 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Sep 4 21:37:59.022863 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Sep 4 21:37:59.062545 kernel: ipmi device interface Sep 4 21:37:59.062593 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Sep 4 21:37:59.065200 systemd[1]: /usr/lib/systemd/system/docker.socket:6: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 4 21:37:59.098384 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Sep 4 21:37:59.129689 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Sep 4 21:37:59.130251 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5300_MTFDDAK480TDT OEM. Sep 4 21:37:59.140868 systemd[1]: Condition check resulted in dev-ttyS1.device - /dev/ttyS1 being skipped. Sep 4 21:37:59.141095 systemd[1]: Reloading finished in 338 ms. Sep 4 21:37:59.166661 kernel: iTCO_vendor_support: vendor-support=0 Sep 4 21:37:59.190663 kernel: ipmi_si: IPMI System Interface driver Sep 4 21:37:59.190740 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Sep 4 21:37:59.208038 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Sep 4 21:37:59.225492 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Sep 4 21:37:59.242723 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Sep 4 21:37:59.261824 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Sep 4 21:37:59.281763 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Sep 4 21:37:59.298336 kernel: ipmi_si: Adding ACPI-specified kcs state machine Sep 4 21:37:59.318963 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Sep 4 21:37:59.373330 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Sep 4 21:37:59.373447 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Sep 4 21:37:59.373520 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Sep 4 21:37:59.402685 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Sep 4 21:37:59.408874 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 4 21:37:59.469007 kernel: intel_rapl_common: Found RAPL domain package Sep 4 21:37:59.469053 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Sep 4 21:37:59.469153 kernel: intel_rapl_common: Found RAPL domain core Sep 4 21:37:59.469164 kernel: intel_rapl_common: Found RAPL domain dram Sep 4 21:37:59.513697 kernel: ipmi_ssif: IPMI SSIF Interface driver Sep 4 21:37:59.529906 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Sep 4 21:37:59.548970 systemd[1]: Finished systemd-udev-settle.service - Wait for udev To Complete Device Initialization. Sep 4 21:37:59.562189 systemd[1]: Finished ensure-sysext.service. Sep 4 21:37:59.581594 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 4 21:37:59.598797 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Sep 4 21:37:59.609958 systemd[1]: Starting clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs... Sep 4 21:37:59.616641 augenrules[1361]: No rules Sep 4 21:37:59.620799 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Sep 4 21:37:59.632186 systemd[1]: Starting lvm2-activation-early.service - Activation of LVM2 logical volumes... Sep 4 21:37:59.643338 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Sep 4 21:37:59.651161 lvm[1366]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 4 21:37:59.653274 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Sep 4 21:37:59.663279 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Sep 4 21:37:59.675251 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Sep 4 21:37:59.685797 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Sep 4 21:37:59.686331 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM... Sep 4 21:37:59.697350 systemd[1]: Starting systemd-journal-catalog-update.service - Rebuild Journal Catalog... Sep 4 21:37:59.708571 systemd[1]: Starting systemd-networkd.service - Network Configuration... Sep 4 21:37:59.709513 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Sep 4 21:37:59.710342 systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Sep 4 21:37:59.725351 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Sep 4 21:37:59.736325 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 4 21:37:59.756747 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 4 21:37:59.757250 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Sep 4 21:37:59.767901 systemd[1]: Finished clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs. Sep 4 21:37:59.768054 systemd[1]: Finished lvm2-activation-early.service - Activation of LVM2 logical volumes. Sep 4 21:37:59.768210 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 4 21:37:59.768277 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Sep 4 21:37:59.768418 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 4 21:37:59.768481 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Sep 4 21:37:59.768618 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 4 21:37:59.768685 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Sep 4 21:37:59.768815 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 4 21:37:59.768889 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Sep 4 21:37:59.769034 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM. Sep 4 21:37:59.769179 systemd[1]: Finished systemd-journal-catalog-update.service - Rebuild Journal Catalog. Sep 4 21:37:59.773270 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Sep 4 21:37:59.783773 systemd[1]: Starting lvm2-activation.service - Activation of LVM2 logical volumes... Sep 4 21:37:59.783804 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 4 21:37:59.783833 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Sep 4 21:37:59.784425 systemd[1]: Starting systemd-update-done.service - Update is Completed... Sep 4 21:37:59.785289 systemd[1]: Starting systemd-userdbd.service - User Database Manager... Sep 4 21:37:59.785315 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 4 21:37:59.785538 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Sep 4 21:37:59.785904 lvm[1390]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 4 21:37:59.791678 systemd[1]: Finished systemd-update-done.service - Update is Completed. Sep 4 21:37:59.805966 systemd[1]: Started systemd-userdbd.service - User Database Manager. Sep 4 21:37:59.835585 systemd-resolved[1375]: Positive Trust Anchors: Sep 4 21:37:59.835591 systemd-resolved[1375]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 4 21:37:59.835616 systemd-resolved[1375]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 170.0.0.192.in-addr.arpa 171.0.0.192.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa ipv4only.arpa corp home internal intranet lan local private test Sep 4 21:37:59.837938 systemd-resolved[1375]: Using system hostname 'ci-3975.2.1-a-7e341a8ba3'. Sep 4 21:37:59.845903 systemd-networkd[1374]: lo: Link UP Sep 4 21:37:59.845906 systemd-networkd[1374]: lo: Gained carrier Sep 4 21:37:59.848412 systemd-networkd[1374]: bond0: netdev ready Sep 4 21:37:59.848832 systemd-networkd[1374]: Enumeration completed Sep 4 21:37:59.852861 systemd-networkd[1374]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:15:b1:1c.network. Sep 4 21:37:59.899920 systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Sep 4 21:37:59.910952 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Sep 4 21:37:59.920733 systemd[1]: Started systemd-networkd.service - Network Configuration. Sep 4 21:37:59.930856 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 4 21:37:59.941836 systemd[1]: Finished lvm2-activation.service - Activation of LVM2 logical volumes. Sep 4 21:37:59.953966 systemd[1]: Reached target network.target - Network. Sep 4 21:37:59.962695 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Sep 4 21:37:59.973699 systemd[1]: Reached target sysinit.target - System Initialization. Sep 4 21:37:59.982747 systemd[1]: Started motdgen.path - Watch for update engine configuration changes. Sep 4 21:37:59.993716 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path - Watch for a cloud-config at /var/lib/flatcar-install/user_data. Sep 4 21:38:00.004740 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Sep 4 21:38:00.015740 systemd[1]: update-engine-stub.timer - Update Engine Stub Timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 4 21:38:00.015771 systemd[1]: Reached target paths.target - Path Units. Sep 4 21:38:00.023696 systemd[1]: Reached target time-set.target - System Time Set. Sep 4 21:38:00.032770 systemd[1]: Started logrotate.timer - Daily rotation of log files. Sep 4 21:38:00.042866 systemd[1]: Started mdadm.timer - Weekly check for MD array's redundancy information.. Sep 4 21:38:00.053874 systemd[1]: Reached target timers.target - Timer Units. Sep 4 21:38:00.062485 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Sep 4 21:38:00.072904 systemd[1]: Starting docker.socket - Docker Socket for the API... Sep 4 21:38:00.083555 systemd[1]: Listening on sshd.socket - OpenSSH Server Socket. Sep 4 21:38:00.095830 systemd[1]: Starting systemd-networkd-wait-online.service - Wait for Network to be Configured... Sep 4 21:38:00.127924 systemd[1]: Listening on docker.socket - Docker Socket for the API. Sep 4 21:38:00.142906 systemd[1]: Reached target sockets.target - Socket Units. Sep 4 21:38:00.150669 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Sep 4 21:38:00.167771 systemd[1]: Reached target basic.target - Basic System. Sep 4 21:38:00.174720 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Sep 4 21:38:00.179460 systemd-networkd[1374]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:15:b1:1d.network. Sep 4 21:38:00.182861 systemd[1]: addon-config@oem.service - Configure Addon /oem was skipped because no trigger condition checks were met. Sep 4 21:38:00.182887 systemd[1]: addon-run@oem.service - Run Addon /oem was skipped because no trigger condition checks were met. Sep 4 21:38:00.192846 systemd[1]: Starting containerd.service - containerd container runtime... Sep 4 21:38:00.204722 systemd[1]: Starting coreos-metadata.service - Flatcar Metadata Agent... Sep 4 21:38:00.217324 systemd[1]: Starting dbus.service - D-Bus System Message Bus... Sep 4 21:38:00.228418 systemd[1]: Starting enable-oem-cloudinit.service - Enable cloudinit... Sep 4 21:38:00.238397 systemd[1]: Starting extend-filesystems.service - Extend Filesystems... Sep 4 21:38:00.244295 jq[1424]: false Sep 4 21:38:00.247795 systemd[1]: flatcar-setup-environment.service - Modifies /etc/environment for CoreOS was skipped because of an unmet condition check (ConditionPathExists=/oem/bin/flatcar-setup-environment). Sep 4 21:38:00.248624 systemd[1]: Starting motdgen.service - Generate /run/flatcar/motd... Sep 4 21:38:00.252159 dbus-daemon[1423]: [system] SELinux support is enabled Sep 4 21:38:00.255528 coreos-metadata[1422]: Sep 04 21:38:00.255 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Sep 4 21:38:00.256399 coreos-metadata[1422]: Sep 04 21:38:00.256 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Sep 4 21:38:00.256655 extend-filesystems[1425]: Found loop3 Sep 4 21:38:00.257803 extend-filesystems[1425]: Found loop4 Sep 4 21:38:00.257803 extend-filesystems[1425]: Found loop5 Sep 4 21:38:00.257803 extend-filesystems[1425]: Found sda Sep 4 21:38:00.257803 extend-filesystems[1425]: Found sda1 Sep 4 21:38:00.257803 extend-filesystems[1425]: Found sda2 Sep 4 21:38:00.257803 extend-filesystems[1425]: Found sda3 Sep 4 21:38:00.257803 extend-filesystems[1425]: Found usr Sep 4 21:38:00.257803 extend-filesystems[1425]: Found sda4 Sep 4 21:38:00.257803 extend-filesystems[1425]: Found sda6 Sep 4 21:38:00.257803 extend-filesystems[1425]: Found sda7 Sep 4 21:38:00.257803 extend-filesystems[1425]: Found sda9 Sep 4 21:38:00.257803 extend-filesystems[1425]: Checking size of /dev/sda9 Sep 4 21:38:00.428855 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Sep 4 21:38:00.428875 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 33 scanned by (udev-worker) (1213) Sep 4 21:38:00.428889 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Sep 4 21:38:00.429012 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Sep 4 21:38:00.429024 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Sep 4 21:38:00.429045 extend-filesystems[1425]: Resized partition /dev/sda9 Sep 4 21:38:00.258461 systemd[1]: Starting ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline... Sep 4 21:38:00.444905 extend-filesystems[1437]: resize2fs 1.47.0 (5-Feb-2023) Sep 4 21:38:00.312503 systemd[1]: Starting sshd-keygen.service - Generate sshd host keys... Sep 4 21:38:00.390768 systemd-networkd[1374]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Sep 4 21:38:00.391133 systemd-networkd[1374]: enp1s0f0np0: Link UP Sep 4 21:38:00.392325 systemd-networkd[1374]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:15:b1:1c.network. Sep 4 21:38:00.392493 systemd-networkd[1374]: enp1s0f1np1: Link UP Sep 4 21:38:00.392668 systemd-networkd[1374]: bond0: Link UP Sep 4 21:38:00.392766 systemd[1]: Starting systemd-logind.service - User Login Management... Sep 4 21:38:00.413470 systemd-networkd[1374]: enp1s0f0np0: Gained carrier Sep 4 21:38:00.425780 systemd-networkd[1374]: enp1s0f1np1: Gained carrier Sep 4 21:38:00.429738 systemd[1]: Starting tcsd.service - TCG Core Services Daemon... Sep 4 21:38:00.433844 systemd-networkd[1374]: bond0: Gained carrier Sep 4 21:38:00.433958 systemd-timesyncd[1376]: Network configuration changed, trying to establish connection. Sep 4 21:38:00.434111 systemd-timesyncd[1376]: Network configuration changed, trying to establish connection. Sep 4 21:38:00.459943 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 4 21:38:00.460323 systemd[1]: Starting update-engine.service - Update Engine... Sep 4 21:38:00.466530 systemd-logind[1447]: Watching system buttons on /dev/input/event3 (Power Button) Sep 4 21:38:00.466541 systemd-logind[1447]: Watching system buttons on /dev/input/event2 (Sleep Button) Sep 4 21:38:00.466551 systemd-logind[1447]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Sep 4 21:38:00.466663 systemd-logind[1447]: New seat seat0. Sep 4 21:38:00.468308 systemd[1]: Starting update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition... Sep 4 21:38:00.476047 systemd[1]: Started dbus.service - D-Bus System Message Bus. Sep 4 21:38:00.483300 update_engine[1452]: I0904 21:38:00.483270 1452 main.cc:92] Flatcar Update Engine starting Sep 4 21:38:00.483918 update_engine[1452]: I0904 21:38:00.483906 1452 update_check_scheduler.cc:74] Next update check in 10m55s Sep 4 21:38:00.488472 jq[1453]: true Sep 4 21:38:00.496850 systemd[1]: Started systemd-logind.service - User Login Management. Sep 4 21:38:00.519660 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Sep 4 21:38:00.519685 kernel: bond0: active interface up! Sep 4 21:38:00.542835 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 4 21:38:00.542929 systemd[1]: Condition check resulted in enable-oem-cloudinit.service - Enable cloudinit being skipped. Sep 4 21:38:00.543093 systemd[1]: motdgen.service: Deactivated successfully. Sep 4 21:38:00.543179 systemd[1]: Finished motdgen.service - Generate /run/flatcar/motd. Sep 4 21:38:00.550850 sshd_keygen[1451]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 4 21:38:00.552890 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 4 21:38:00.552975 systemd[1]: Finished ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline. Sep 4 21:38:00.563910 systemd[1]: Finished sshd-keygen.service - Generate sshd host keys. Sep 4 21:38:00.576721 (ntainerd)[1463]: containerd.service: Referenced but unset environment variable evaluates to an empty string: TORCX_IMAGEDIR, TORCX_UNPACKDIR Sep 4 21:38:00.578345 jq[1462]: false Sep 4 21:38:00.579563 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Sep 4 21:38:00.579701 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition being skipped. Sep 4 21:38:00.580327 dbus-daemon[1423]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 4 21:38:00.592280 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Sep 4 21:38:00.592372 systemd[1]: Condition check resulted in tcsd.service - TCG Core Services Daemon being skipped. Sep 4 21:38:00.592865 systemd[1]: Started update-engine.service - Update Engine. Sep 4 21:38:00.612805 systemd[1]: Starting issuegen.service - Generate /run/issue... Sep 4 21:38:00.621596 systemd[1]: Starting sshkeys.service... Sep 4 21:38:00.635240 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service - Load cloud-config from /usr/share/oem/cloud-config.yml was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 4 21:38:00.635346 systemd[1]: Reached target system-config.target - Load system-provided cloud configs. Sep 4 21:38:00.647660 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Sep 4 21:38:00.657805 systemd[1]: user-cloudinit-proc-cmdline.service - Load cloud-config from url defined in /proc/cmdline was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 4 21:38:00.657899 systemd[1]: Reached target user-config.target - Load user-provided cloud configs. Sep 4 21:38:00.674857 systemd[1]: Started locksmithd.service - Cluster reboot manager. Sep 4 21:38:00.687345 systemd[1]: issuegen.service: Deactivated successfully. Sep 4 21:38:00.687454 systemd[1]: Finished issuegen.service - Generate /run/issue. Sep 4 21:38:00.693957 locksmithd[1489]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 4 21:38:00.708878 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Sep 4 21:38:00.721219 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Sep 4 21:38:00.733703 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice - Slice /system/coreos-metadata-sshkeys. Sep 4 21:38:00.746888 containerd[1463]: time="2024-09-04T21:38:00.746824653Z" level=info msg="starting containerd" revision=1fbfc07f8d28210e62bdbcbf7b950bac8028afbf version=v1.7.17 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.759806337Z" level=info msg="loading plugin \"io.containerd.warning.v1.deprecations\"..." type=io.containerd.warning.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.759826417Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.760552600Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/6.6.48-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.760568090Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.760677691Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.760687488Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.760730540Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." type=io.containerd.snapshotter.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.760760104Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." error="no scratch file generator: skip plugin" type=io.containerd.snapshotter.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.760767593Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.760806543Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 4 21:38:00.764797 containerd[1463]: time="2024-09-04T21:38:00.760912973Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 4 21:38:00.764889 systemd[1]: Starting coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys)... Sep 4 21:38:00.765058 containerd[1463]: time="2024-09-04T21:38:00.760922769Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 4 21:38:00.765058 containerd[1463]: time="2024-09-04T21:38:00.760928256Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 4 21:38:00.765058 containerd[1463]: time="2024-09-04T21:38:00.760979861Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 4 21:38:00.765058 containerd[1463]: time="2024-09-04T21:38:00.760987772Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 4 21:38:00.765058 containerd[1463]: time="2024-09-04T21:38:00.761013709Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 4 21:38:00.765058 containerd[1463]: time="2024-09-04T21:38:00.761021263Z" level=info msg="metadata content store policy set" policy=shared Sep 4 21:38:00.775643 coreos-metadata[1502]: Sep 04 21:38:00.775 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Sep 4 21:38:00.776411 systemd[1]: Started getty@tty1.service - Getty on tty1. Sep 4 21:38:00.778507 containerd[1463]: time="2024-09-04T21:38:00.778466080Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 4 21:38:00.778507 containerd[1463]: time="2024-09-04T21:38:00.778486221Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 4 21:38:00.778507 containerd[1463]: time="2024-09-04T21:38:00.778495525Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 4 21:38:00.778561 containerd[1463]: time="2024-09-04T21:38:00.778511478Z" level=info msg="loading plugin \"io.containerd.lease.v1.manager\"..." type=io.containerd.lease.v1 Sep 4 21:38:00.778561 containerd[1463]: time="2024-09-04T21:38:00.778520176Z" level=info msg="loading plugin \"io.containerd.nri.v1.nri\"..." type=io.containerd.nri.v1 Sep 4 21:38:00.778561 containerd[1463]: time="2024-09-04T21:38:00.778526621Z" level=info msg="NRI interface is disabled by configuration." Sep 4 21:38:00.778561 containerd[1463]: time="2024-09-04T21:38:00.778534471Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 4 21:38:00.778618 containerd[1463]: time="2024-09-04T21:38:00.778599374Z" level=info msg="loading plugin \"io.containerd.runtime.v2.shim\"..." type=io.containerd.runtime.v2 Sep 4 21:38:00.778618 containerd[1463]: time="2024-09-04T21:38:00.778609496Z" level=info msg="loading plugin \"io.containerd.sandbox.store.v1.local\"..." type=io.containerd.sandbox.store.v1 Sep 4 21:38:00.778618 containerd[1463]: time="2024-09-04T21:38:00.778617087Z" level=info msg="loading plugin \"io.containerd.sandbox.controller.v1.local\"..." type=io.containerd.sandbox.controller.v1 Sep 4 21:38:00.778661 containerd[1463]: time="2024-09-04T21:38:00.778625062Z" level=info msg="loading plugin \"io.containerd.streaming.v1.manager\"..." type=io.containerd.streaming.v1 Sep 4 21:38:00.778661 containerd[1463]: time="2024-09-04T21:38:00.778633280Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 4 21:38:00.778661 containerd[1463]: time="2024-09-04T21:38:00.778642877Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 4 21:38:00.778661 containerd[1463]: time="2024-09-04T21:38:00.778650025Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 4 21:38:00.778717 containerd[1463]: time="2024-09-04T21:38:00.778662649Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 4 21:38:00.778717 containerd[1463]: time="2024-09-04T21:38:00.778673949Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 4 21:38:00.778717 containerd[1463]: time="2024-09-04T21:38:00.778682521Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 4 21:38:00.778717 containerd[1463]: time="2024-09-04T21:38:00.778689738Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 4 21:38:00.778717 containerd[1463]: time="2024-09-04T21:38:00.778695767Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 4 21:38:00.778805 containerd[1463]: time="2024-09-04T21:38:00.778750698Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 4 21:38:00.778949 containerd[1463]: time="2024-09-04T21:38:00.778906023Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 4 21:38:00.778949 containerd[1463]: time="2024-09-04T21:38:00.778928397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.778949 containerd[1463]: time="2024-09-04T21:38:00.778938455Z" level=info msg="loading plugin \"io.containerd.transfer.v1.local\"..." type=io.containerd.transfer.v1 Sep 4 21:38:00.779011 containerd[1463]: time="2024-09-04T21:38:00.778953232Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 4 21:38:00.779011 containerd[1463]: time="2024-09-04T21:38:00.778987904Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779011 containerd[1463]: time="2024-09-04T21:38:00.778998997Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779011 containerd[1463]: time="2024-09-04T21:38:00.779006267Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779066 containerd[1463]: time="2024-09-04T21:38:00.779012857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779066 containerd[1463]: time="2024-09-04T21:38:00.779020378Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779066 containerd[1463]: time="2024-09-04T21:38:00.779027364Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779066 containerd[1463]: time="2024-09-04T21:38:00.779034455Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779066 containerd[1463]: time="2024-09-04T21:38:00.779040861Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779066 containerd[1463]: time="2024-09-04T21:38:00.779048505Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 4 21:38:00.779232 containerd[1463]: time="2024-09-04T21:38:00.779194615Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandbox-controllers\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779232 containerd[1463]: time="2024-09-04T21:38:00.779205109Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandboxes\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779232 containerd[1463]: time="2024-09-04T21:38:00.779212224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779232 containerd[1463]: time="2024-09-04T21:38:00.779218870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.streaming\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779232 containerd[1463]: time="2024-09-04T21:38:00.779226554Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779232 containerd[1463]: time="2024-09-04T21:38:00.779234155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.transfer\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779329 containerd[1463]: time="2024-09-04T21:38:00.779241379Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779329 containerd[1463]: time="2024-09-04T21:38:00.779247212Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 4 21:38:00.779469 containerd[1463]: time="2024-09-04T21:38:00.779415055Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.8 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s ImagePullWithSyncFs:false IgnoreDeprecationWarnings:[]} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 4 21:38:00.779469 containerd[1463]: time="2024-09-04T21:38:00.779450132Z" level=info msg="Connect containerd service" Sep 4 21:38:00.779469 containerd[1463]: time="2024-09-04T21:38:00.779467538Z" level=info msg="using legacy CRI server" Sep 4 21:38:00.779573 containerd[1463]: time="2024-09-04T21:38:00.779472050Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this" Sep 4 21:38:00.779573 containerd[1463]: time="2024-09-04T21:38:00.779521582Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 4 21:38:00.779874 containerd[1463]: time="2024-09-04T21:38:00.779833713Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 4 21:38:00.779874 containerd[1463]: time="2024-09-04T21:38:00.779853724Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 4 21:38:00.779874 containerd[1463]: time="2024-09-04T21:38:00.779864046Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="skip plugin: tracing endpoint not configured" type=io.containerd.tracing.processor.v1 Sep 4 21:38:00.779874 containerd[1463]: time="2024-09-04T21:38:00.779870470Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 4 21:38:00.779948 containerd[1463]: time="2024-09-04T21:38:00.779877094Z" level=info msg="skip loading plugin \"io.containerd.internal.v1.tracing\"..." error="skip plugin: tracing endpoint not configured" type=io.containerd.internal.v1 Sep 4 21:38:00.780014 containerd[1463]: time="2024-09-04T21:38:00.779953919Z" level=info msg="Start subscribing containerd event" Sep 4 21:38:00.780014 containerd[1463]: time="2024-09-04T21:38:00.779986314Z" level=info msg="Start recovering state" Sep 4 21:38:00.780054 containerd[1463]: time="2024-09-04T21:38:00.780039298Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 4 21:38:00.780082 containerd[1463]: time="2024-09-04T21:38:00.780073547Z" level=info msg="Start event monitor" Sep 4 21:38:00.780098 containerd[1463]: time="2024-09-04T21:38:00.780087488Z" level=info msg="Start snapshots syncer" Sep 4 21:38:00.780098 containerd[1463]: time="2024-09-04T21:38:00.780088726Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 4 21:38:00.780130 containerd[1463]: time="2024-09-04T21:38:00.780093771Z" level=info msg="Start cni network conf syncer for default" Sep 4 21:38:00.780130 containerd[1463]: time="2024-09-04T21:38:00.780124187Z" level=info msg="Start streaming server" Sep 4 21:38:00.780172 containerd[1463]: time="2024-09-04T21:38:00.780161968Z" level=info msg="containerd successfully booted in 0.033744s" Sep 4 21:38:00.786566 systemd[1]: Started serial-getty@ttyS1.service - Serial Getty on ttyS1. Sep 4 21:38:00.796840 systemd[1]: Reached target getty.target - Login Prompts. Sep 4 21:38:00.809841 systemd[1]: Started containerd.service - containerd container runtime. Sep 4 21:38:00.821693 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Sep 4 21:38:00.842638 extend-filesystems[1437]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Sep 4 21:38:00.842638 extend-filesystems[1437]: old_desc_blocks = 1, new_desc_blocks = 56 Sep 4 21:38:00.842638 extend-filesystems[1437]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Sep 4 21:38:00.883737 extend-filesystems[1425]: Resized filesystem in /dev/sda9 Sep 4 21:38:00.883737 extend-filesystems[1425]: Found sdb Sep 4 21:38:00.843381 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 4 21:38:00.843487 systemd[1]: Finished extend-filesystems.service - Extend Filesystems. Sep 4 21:38:01.256556 coreos-metadata[1422]: Sep 04 21:38:01.256 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Sep 4 21:38:01.578097 systemd-timesyncd[1376]: Network configuration changed, trying to establish connection. Sep 4 21:38:01.897729 systemd-networkd[1374]: bond0: Gained IPv6LL Sep 4 21:38:01.897916 systemd-timesyncd[1376]: Network configuration changed, trying to establish connection. Sep 4 21:38:01.898902 systemd[1]: Finished systemd-networkd-wait-online.service - Wait for Network to be Configured. Sep 4 21:38:01.910406 systemd[1]: Reached target network-online.target - Network is Online. Sep 4 21:38:01.933931 systemd[1]: Starting nvidia.service - NVIDIA Configure Service... Sep 4 21:38:01.943295 systemd[1]: Finished nvidia.service - NVIDIA Configure Service. Sep 4 21:38:03.108100 kernel: mlx5_core 0000:01:00.0: lag map: port 1:1 port 2:2 Sep 4 21:38:03.108515 kernel: mlx5_core 0000:01:00.0: shared_fdb:0 mode:queue_affinity Sep 4 21:38:04.407505 coreos-metadata[1422]: Sep 04 21:38:04.407 INFO Fetch successful Sep 4 21:38:04.448477 coreos-metadata[1502]: Sep 04 21:38:04.448 INFO Fetch successful Sep 4 21:38:04.493538 unknown[1502]: wrote ssh authorized keys file for user: core Sep 4 21:38:04.503067 systemd[1]: Finished coreos-metadata.service - Flatcar Metadata Agent. Sep 4 21:38:04.513537 update-ssh-keys[1530]: Updated "/home/core/.ssh/authorized_keys" Sep 4 21:38:04.513896 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Sep 4 21:38:04.524566 systemd[1]: Starting packet-phone-home.service - Report Success to Packet... Sep 4 21:38:04.530354 (-wrapper)[1536]: etcd-member.service: Referenced but unset environment variable evaluates to an empty string: ETCD_OPTS Sep 4 21:38:04.534210 systemd[1]: Finished coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys). Sep 4 21:38:04.545731 systemd[1]: Finished sshkeys.service. Sep 4 21:38:04.644989 systemd[1]: Starting docker.service - Docker Application Container Engine... Sep 4 21:38:04.645047 (dockerd)[1550]: docker.service: Referenced but unset environment variable evaluates to an empty string: DOCKER_CGROUPS, DOCKER_OPTS, DOCKER_OPT_BIP, DOCKER_OPT_IPMASQ, DOCKER_OPT_MTU Sep 4 21:38:04.772481 systemd[1]: Created slice system-sshd.slice - Slice /system/sshd. Sep 4 21:38:04.783494 systemd[1]: Started sshd@0-147.28.180.253:22-139.178.89.65:42730.service - OpenSSH per-connection server daemon (139.178.89.65:42730). Sep 4 21:38:04.828626 systemd[1]: Finished packet-phone-home.service - Report Success to Packet. Sep 4 21:38:04.862758 sshd[1566]: Accepted publickey for core from 139.178.89.65 port 42730 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:04.864576 sshd[1566]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:04.870136 systemd-logind[1447]: New session 1 of user core. Sep 4 21:38:04.870875 systemd[1]: Created slice user-500.slice - User Slice of UID 500. Sep 4 21:38:04.871580 dockerd[1550]: time="2024-09-04T21:38:04.871550675Z" level=info msg="Starting up" Sep 4 21:38:04.889848 systemd[1]: Starting user-runtime-dir@500.service - User Runtime Directory /run/user/500... Sep 4 21:38:04.894099 dockerd[1550]: time="2024-09-04T21:38:04.894035454Z" level=info msg="Loading containers: start." Sep 4 21:38:04.902261 systemd[1]: Finished user-runtime-dir@500.service - User Runtime Directory /run/user/500. Sep 4 21:38:04.930866 systemd[1]: Starting user@500.service - User Manager for UID 500... Sep 4 21:38:04.941456 (systemd)[1579]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:04.990665 kernel: Initializing XFRM netlink socket Sep 4 21:38:05.008409 systemd-timesyncd[1376]: Network configuration changed, trying to establish connection. Sep 4 21:38:05.008475 systemd-timesyncd[1376]: Network configuration changed, trying to establish connection. Sep 4 21:38:05.011539 systemd-timesyncd[1376]: Network configuration changed, trying to establish connection. Sep 4 21:38:05.019858 systemd[1579]: Queued start job for default target default.target. Sep 4 21:38:05.040932 systemd[1579]: Created slice app.slice - User Application Slice. Sep 4 21:38:05.040947 systemd[1579]: Reached target paths.target - Paths. Sep 4 21:38:05.040956 systemd[1579]: Reached target timers.target - Timers. Sep 4 21:38:05.041571 systemd[1579]: Starting dbus.socket - D-Bus User Message Bus Socket... Sep 4 21:38:05.047447 systemd[1579]: Listening on dbus.socket - D-Bus User Message Bus Socket. Sep 4 21:38:05.047479 systemd[1579]: Reached target sockets.target - Sockets. Sep 4 21:38:05.047489 systemd[1579]: Reached target basic.target - Basic System. Sep 4 21:38:05.047510 systemd[1579]: Reached target default.target - Main User Target. Sep 4 21:38:05.047525 systemd[1579]: Startup finished in 102ms. Sep 4 21:38:05.047637 systemd[1]: Started user@500.service - User Manager for UID 500. Sep 4 21:38:05.051694 systemd-networkd[1374]: docker0: Link UP Sep 4 21:38:05.051861 systemd-timesyncd[1376]: Network configuration changed, trying to establish connection. Sep 4 21:38:05.057441 systemd[1]: Started session-1.scope - Session 1 of User core. Sep 4 21:38:05.065458 dockerd[1550]: time="2024-09-04T21:38:05.065441245Z" level=info msg="Loading containers: done." Sep 4 21:38:05.109646 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck556098692-merged.mount: Deactivated successfully. Sep 4 21:38:05.123789 systemd[1]: Started sshd@1-147.28.180.253:22-139.178.89.65:42732.service - OpenSSH per-connection server daemon (139.178.89.65:42732). Sep 4 21:38:05.127123 dockerd[1550]: time="2024-09-04T21:38:05.127097914Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 4 21:38:05.127261 dockerd[1550]: time="2024-09-04T21:38:05.127210961Z" level=info msg="Docker daemon" commit=fca702de7f71362c8d103073c7e4a1d0a467fadd graphdriver=overlay2 version=24.0.9 Sep 4 21:38:05.127316 dockerd[1550]: time="2024-09-04T21:38:05.127308711Z" level=info msg="Daemon has completed initialization" Sep 4 21:38:05.139527 dockerd[1550]: time="2024-09-04T21:38:05.139502013Z" level=info msg="API listen on /run/docker.sock" Sep 4 21:38:05.139563 systemd[1]: Started docker.service - Docker Application Container Engine. Sep 4 21:38:05.140085 etcd-wrapper[1541]: Error response from daemon: No such container: etcd-member Sep 4 21:38:05.147525 etcd-wrapper[1692]: Error response from daemon: No such container: etcd-member Sep 4 21:38:05.161295 sshd[1674]: Accepted publickey for core from 139.178.89.65 port 42732 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:05.162098 sshd[1674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:05.162967 etcd-wrapper[1714]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Sep 4 21:38:05.164566 systemd-logind[1447]: New session 2 of user core. Sep 4 21:38:05.176816 systemd[1]: Started session-2.scope - Session 2 of User core. Sep 4 21:38:05.239535 sshd[1674]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:05.256541 systemd[1]: sshd@1-147.28.180.253:22-139.178.89.65:42732.service: Deactivated successfully. Sep 4 21:38:05.260447 systemd[1]: session-2.scope: Deactivated successfully. Sep 4 21:38:05.264168 systemd-logind[1447]: Session 2 logged out. Waiting for processes to exit. Sep 4 21:38:05.287531 systemd[1]: Started sshd@2-147.28.180.253:22-139.178.89.65:42736.service - OpenSSH per-connection server daemon (139.178.89.65:42736). Sep 4 21:38:05.299576 systemd-logind[1447]: Removed session 2. Sep 4 21:38:05.322194 sshd[1728]: Accepted publickey for core from 139.178.89.65 port 42736 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:05.323002 sshd[1728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:05.325621 systemd-logind[1447]: New session 3 of user core. Sep 4 21:38:05.342948 systemd[1]: Started session-3.scope - Session 3 of User core. Sep 4 21:38:05.405772 sshd[1728]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:05.407185 systemd[1]: sshd@2-147.28.180.253:22-139.178.89.65:42736.service: Deactivated successfully. Sep 4 21:38:05.408022 systemd[1]: session-3.scope: Deactivated successfully. Sep 4 21:38:05.408668 systemd-logind[1447]: Session 3 logged out. Waiting for processes to exit. Sep 4 21:38:05.409368 systemd-logind[1447]: Removed session 3. Sep 4 21:38:05.826613 login[1516]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 4 21:38:05.829503 systemd-logind[1447]: New session 4 of user core. Sep 4 21:38:05.846017 systemd[1]: Started session-4.scope - Session 4 of User core. Sep 4 21:38:05.853606 login[1511]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 4 21:38:05.856461 systemd-logind[1447]: New session 5 of user core. Sep 4 21:38:05.857237 systemd[1]: Started session-5.scope - Session 5 of User core. Sep 4 21:38:06.402123 etcd-wrapper[1714]: v3.5.0: Pulling from coreos/etcd Sep 4 21:38:06.681453 systemd[1]: Started sshd@3-147.28.180.253:22-180.101.88.239:34239.service - OpenSSH per-connection server daemon (180.101.88.239:34239). Sep 4 21:38:06.807738 etcd-wrapper[1714]: 1813d21adc01: Pulling fs layer Sep 4 21:38:06.807738 etcd-wrapper[1714]: 6e96907ab677: Pulling fs layer Sep 4 21:38:06.807738 etcd-wrapper[1714]: 444ed0ea8673: Pulling fs layer Sep 4 21:38:06.807738 etcd-wrapper[1714]: 0fd2df5633f0: Pulling fs layer Sep 4 21:38:06.807738 etcd-wrapper[1714]: 8cc22b9456bb: Pulling fs layer Sep 4 21:38:06.807738 etcd-wrapper[1714]: 7ac70aecd290: Pulling fs layer Sep 4 21:38:06.807738 etcd-wrapper[1714]: 4b376c64dfe4: Pulling fs layer Sep 4 21:38:06.807738 etcd-wrapper[1714]: 7ac70aecd290: Waiting Sep 4 21:38:06.807738 etcd-wrapper[1714]: 0fd2df5633f0: Waiting Sep 4 21:38:06.807977 etcd-wrapper[1714]: 8cc22b9456bb: Waiting Sep 4 21:38:07.162686 etcd-wrapper[1714]: 444ed0ea8673: Verifying Checksum Sep 4 21:38:07.162686 etcd-wrapper[1714]: 444ed0ea8673: Download complete Sep 4 21:38:07.177212 etcd-wrapper[1714]: 6e96907ab677: Verifying Checksum Sep 4 21:38:07.177212 etcd-wrapper[1714]: 6e96907ab677: Download complete Sep 4 21:38:07.286319 etcd-wrapper[1714]: 1813d21adc01: Download complete Sep 4 21:38:07.482930 etcd-wrapper[1714]: 8cc22b9456bb: Verifying Checksum Sep 4 21:38:07.482930 etcd-wrapper[1714]: 8cc22b9456bb: Download complete Sep 4 21:38:07.507690 etcd-wrapper[1714]: 0fd2df5633f0: Verifying Checksum Sep 4 21:38:07.507690 etcd-wrapper[1714]: 0fd2df5633f0: Download complete Sep 4 21:38:07.607498 etcd-wrapper[1714]: 7ac70aecd290: Verifying Checksum Sep 4 21:38:07.607498 etcd-wrapper[1714]: 7ac70aecd290: Download complete Sep 4 21:38:07.626120 etcd-wrapper[1714]: 1813d21adc01: Pull complete Sep 4 21:38:07.706304 systemd[1]: var-lib-docker-overlay2-3f988e6c7509faa8bdf5bf01b6b36236da657d7bc2db56c32d6e9fd5c3897bc5-merged.mount: Deactivated successfully. Sep 4 21:38:07.811606 etcd-wrapper[1714]: 4b376c64dfe4: Download complete Sep 4 21:38:07.938379 etcd-wrapper[1714]: 6e96907ab677: Pull complete Sep 4 21:38:08.006456 systemd[1]: var-lib-docker-overlay2-8d387bb7239f4ec76dcaaa04ff65a91419eaa5ddb74d20d007eae241df5a1b8d-merged.mount: Deactivated successfully. Sep 4 21:38:08.055808 etcd-wrapper[1714]: 444ed0ea8673: Pull complete Sep 4 21:38:08.149264 etcd-wrapper[1714]: 0fd2df5633f0: Pull complete Sep 4 21:38:08.155630 etcd-wrapper[1714]: 8cc22b9456bb: Pull complete Sep 4 21:38:08.161627 etcd-wrapper[1714]: 7ac70aecd290: Pull complete Sep 4 21:38:08.167519 etcd-wrapper[1714]: 4b376c64dfe4: Pull complete Sep 4 21:38:08.170374 etcd-wrapper[1714]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Sep 4 21:38:08.171341 etcd-wrapper[1714]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Sep 4 21:38:08.281475 containerd[1463]: time="2024-09-04T21:38:08.281197795Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 4 21:38:08.281475 containerd[1463]: time="2024-09-04T21:38:08.281405514Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 4 21:38:08.281475 containerd[1463]: time="2024-09-04T21:38:08.281415274Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 4 21:38:08.281475 containerd[1463]: time="2024-09-04T21:38:08.281424611Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 4 21:38:08.300914 systemd[1]: Started docker-c5115069e68cb733213f332cdca8ce8b3113cbddc1279fbb498aed671c20d048.scope - libcontainer container c5115069e68cb733213f332cdca8ce8b3113cbddc1279fbb498aed671c20d048. Sep 4 21:38:08.335271 etcd-wrapper[1714]: {"level":"info","ts":1725485888.3351495,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Sep 4 21:38:08.335271 etcd-wrapper[1714]: {"level":"info","ts":1725485888.3351867,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"0e8ed50beb1f4094a1a387d8a04b8bcb"} Sep 4 21:38:08.335271 etcd-wrapper[1714]: {"level":"warn","ts":1725485888.3352017,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Sep 4 21:38:08.335271 etcd-wrapper[1714]: {"level":"warn","ts":1725485888.3352058,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Sep 4 21:38:08.335271 etcd-wrapper[1714]: {"level":"warn","ts":1725485888.3352091,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Sep 4 21:38:08.335271 etcd-wrapper[1714]: {"level":"warn","ts":1725485888.335212,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Sep 4 21:38:08.335522 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:38:08.335Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.81:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.81:2380","--advertise-client-urls=http://10.67.80.81:2379","--discovery=https://discovery.etcd.io/f17030061a3bf9992af9f5a7ef268522"]} Sep 4 21:38:08.335522 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:38:08.335Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.81:2380"]} Sep 4 21:38:08.335563 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:38:08.335Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Sep 4 21:38:08.335608 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:38:08.335Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"0e8ed50beb1f4094a1a387d8a04b8bcb","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.81:2380"],"listen-peer-urls":["http://10.67.80.81:2380"],"advertise-client-urls":["http://10.67.80.81:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"0e8ed50beb1f4094a1a387d8a04b8bcb=http://10.67.80.81:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/f17030061a3bf9992af9f5a7ef268522","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/f17030061a3bf9992af9f5a7ef268522","discovery-proxy":"","downgrade-check-interval":"5s"} Sep 4 21:38:08.336234 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:38:08.336Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"470.215µs"} Sep 4 21:38:08.630661 systemd[1]: var-lib-docker-overlay2-1fbe8af44677d4069163ca3af378c78acd40392505aba3d0d8de7520c31cdba2-merged.mount: Deactivated successfully. Sep 4 21:38:09.037412 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:38:09.036Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"8f0f9409ea583684"} Sep 4 21:38:09.037412 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:38:09.036Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":1,"needed-peers":2} Sep 4 21:38:10.352359 sshd[1845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:38:11.829267 sshd[1756]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:38:12.125632 sshd[1846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:38:14.741568 sshd[1756]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:38:15.033755 sshd[1847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:38:15.431017 systemd[1]: Started sshd@4-147.28.180.253:22-139.178.89.65:34578.service - OpenSSH per-connection server daemon (139.178.89.65:34578). Sep 4 21:38:15.457202 sshd[1849]: Accepted publickey for core from 139.178.89.65 port 34578 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:15.458145 sshd[1849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:15.461696 systemd-logind[1447]: New session 6 of user core. Sep 4 21:38:15.477919 systemd[1]: Started session-6.scope - Session 6 of User core. Sep 4 21:38:15.533591 sshd[1849]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:15.546312 systemd[1]: sshd@4-147.28.180.253:22-139.178.89.65:34578.service: Deactivated successfully. Sep 4 21:38:15.547105 systemd[1]: session-6.scope: Deactivated successfully. Sep 4 21:38:15.547897 systemd-logind[1447]: Session 6 logged out. Waiting for processes to exit. Sep 4 21:38:15.548518 systemd[1]: Started sshd@5-147.28.180.253:22-139.178.89.65:34592.service - OpenSSH per-connection server daemon (139.178.89.65:34592). Sep 4 21:38:15.549129 systemd-logind[1447]: Removed session 6. Sep 4 21:38:15.580840 sshd[1856]: Accepted publickey for core from 139.178.89.65 port 34592 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:15.582335 sshd[1856]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:15.588437 systemd-logind[1447]: New session 7 of user core. Sep 4 21:38:15.605203 systemd[1]: Started session-7.scope - Session 7 of User core. Sep 4 21:38:15.676162 sshd[1856]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:15.682511 systemd[1]: sshd@5-147.28.180.253:22-139.178.89.65:34592.service: Deactivated successfully. Sep 4 21:38:15.686340 systemd[1]: session-7.scope: Deactivated successfully. Sep 4 21:38:15.687532 systemd-logind[1447]: Session 7 logged out. Waiting for processes to exit. Sep 4 21:38:15.688270 systemd-logind[1447]: Removed session 7. Sep 4 21:38:16.726552 sshd[1756]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:38:16.871992 sshd[1756]: Received disconnect from 180.101.88.239 port 34239:11: [preauth] Sep 4 21:38:16.871992 sshd[1756]: Disconnected from authenticating user root 180.101.88.239 port 34239 [preauth] Sep 4 21:38:16.875467 systemd[1]: sshd@3-147.28.180.253:22-180.101.88.239:34239.service: Deactivated successfully. Sep 4 21:38:25.700037 systemd[1]: Started sshd@6-147.28.180.253:22-139.178.89.65:58114.service - OpenSSH per-connection server daemon (139.178.89.65:58114). Sep 4 21:38:25.726094 sshd[1865]: Accepted publickey for core from 139.178.89.65 port 58114 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:25.726825 sshd[1865]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:25.729987 systemd-logind[1447]: New session 8 of user core. Sep 4 21:38:25.743912 systemd[1]: Started session-8.scope - Session 8 of User core. Sep 4 21:38:25.797972 sshd[1865]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:25.811324 systemd[1]: sshd@6-147.28.180.253:22-139.178.89.65:58114.service: Deactivated successfully. Sep 4 21:38:25.812101 systemd[1]: session-8.scope: Deactivated successfully. Sep 4 21:38:25.812878 systemd-logind[1447]: Session 8 logged out. Waiting for processes to exit. Sep 4 21:38:25.813554 systemd[1]: Started sshd@7-147.28.180.253:22-139.178.89.65:58122.service - OpenSSH per-connection server daemon (139.178.89.65:58122). Sep 4 21:38:25.814168 systemd-logind[1447]: Removed session 8. Sep 4 21:38:25.845893 sshd[1872]: Accepted publickey for core from 139.178.89.65 port 58122 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:25.847375 sshd[1872]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:25.853790 systemd-logind[1447]: New session 9 of user core. Sep 4 21:38:25.876210 systemd[1]: Started session-9.scope - Session 9 of User core. Sep 4 21:38:25.936505 sshd[1872]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:25.937805 systemd[1]: sshd@7-147.28.180.253:22-139.178.89.65:58122.service: Deactivated successfully. Sep 4 21:38:25.938625 systemd[1]: session-9.scope: Deactivated successfully. Sep 4 21:38:25.939325 systemd-logind[1447]: Session 9 logged out. Waiting for processes to exit. Sep 4 21:38:25.940076 systemd-logind[1447]: Removed session 9. Sep 4 21:38:35.333089 systemd-timesyncd[1376]: Contacted time server [2607:f1c0:f05d:bf00::1]:123 (2.flatcar.pool.ntp.org). Sep 4 21:38:35.333235 systemd-timesyncd[1376]: Initial clock synchronization to Wed 2024-09-04 21:38:35.621784 UTC. Sep 4 21:38:35.964946 systemd[1]: Started sshd@8-147.28.180.253:22-139.178.89.65:50272.service - OpenSSH per-connection server daemon (139.178.89.65:50272). Sep 4 21:38:35.990432 sshd[1880]: Accepted publickey for core from 139.178.89.65 port 50272 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:35.991182 sshd[1880]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:35.994065 systemd-logind[1447]: New session 10 of user core. Sep 4 21:38:36.004868 systemd[1]: Started session-10.scope - Session 10 of User core. Sep 4 21:38:36.061295 sshd[1880]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:36.080598 systemd[1]: sshd@8-147.28.180.253:22-139.178.89.65:50272.service: Deactivated successfully. Sep 4 21:38:36.084303 systemd[1]: session-10.scope: Deactivated successfully. Sep 4 21:38:36.087804 systemd-logind[1447]: Session 10 logged out. Waiting for processes to exit. Sep 4 21:38:36.100056 systemd[1]: Started sshd@9-147.28.180.253:22-139.178.89.65:50284.service - OpenSSH per-connection server daemon (139.178.89.65:50284). Sep 4 21:38:36.100600 systemd-logind[1447]: Removed session 10. Sep 4 21:38:36.126860 sshd[1887]: Accepted publickey for core from 139.178.89.65 port 50284 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:36.127805 sshd[1887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:36.131329 systemd-logind[1447]: New session 11 of user core. Sep 4 21:38:36.149079 systemd[1]: Started session-11.scope - Session 11 of User core. Sep 4 21:38:36.217843 sshd[1887]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:36.224384 systemd[1]: sshd@9-147.28.180.253:22-139.178.89.65:50284.service: Deactivated successfully. Sep 4 21:38:36.228309 systemd[1]: session-11.scope: Deactivated successfully. Sep 4 21:38:36.231730 systemd-logind[1447]: Session 11 logged out. Waiting for processes to exit. Sep 4 21:38:36.234527 systemd-logind[1447]: Removed session 11. Sep 4 21:38:46.195359 update_engine[1452]: I0904 21:38:46.195240 1452 update_attempter.cc:509] Updating boot flags... Sep 4 21:38:46.245669 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 33 scanned by (udev-worker) (1904) Sep 4 21:38:46.273672 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 33 scanned by (udev-worker) (1904) Sep 4 21:38:46.455980 systemd[1]: Started sshd@10-147.28.180.253:22-139.178.89.65:57538.service - OpenSSH per-connection server daemon (139.178.89.65:57538). Sep 4 21:38:46.483127 sshd[1914]: Accepted publickey for core from 139.178.89.65 port 57538 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:46.484361 sshd[1914]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:46.488635 systemd-logind[1447]: New session 12 of user core. Sep 4 21:38:46.511248 systemd[1]: Started session-12.scope - Session 12 of User core. Sep 4 21:38:46.583084 sshd[1914]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:46.600526 systemd[1]: sshd@10-147.28.180.253:22-139.178.89.65:57538.service: Deactivated successfully. Sep 4 21:38:46.601530 systemd[1]: session-12.scope: Deactivated successfully. Sep 4 21:38:46.602236 systemd-logind[1447]: Session 12 logged out. Waiting for processes to exit. Sep 4 21:38:46.611110 systemd[1]: Started sshd@11-147.28.180.253:22-139.178.89.65:57548.service - OpenSSH per-connection server daemon (139.178.89.65:57548). Sep 4 21:38:46.611649 systemd-logind[1447]: Removed session 12. Sep 4 21:38:46.638159 sshd[1921]: Accepted publickey for core from 139.178.89.65 port 57548 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:46.639002 sshd[1921]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:46.642304 systemd-logind[1447]: New session 13 of user core. Sep 4 21:38:46.651932 systemd[1]: Started session-13.scope - Session 13 of User core. Sep 4 21:38:46.717379 sshd[1921]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:46.723682 systemd[1]: sshd@11-147.28.180.253:22-139.178.89.65:57548.service: Deactivated successfully. Sep 4 21:38:46.727602 systemd[1]: session-13.scope: Deactivated successfully. Sep 4 21:38:46.730862 systemd-logind[1447]: Session 13 logged out. Waiting for processes to exit. Sep 4 21:38:46.733649 systemd-logind[1447]: Removed session 13. Sep 4 21:38:55.022930 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:38:55.022Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"4911133656ef4a15"} Sep 4 21:38:55.022930 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:38:55.022Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Sep 4 21:38:56.795939 systemd[1]: Started sshd@12-147.28.180.253:22-139.178.89.65:48846.service - OpenSSH per-connection server daemon (139.178.89.65:48846). Sep 4 21:38:56.821815 sshd[1928]: Accepted publickey for core from 139.178.89.65 port 48846 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:56.822559 sshd[1928]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:56.825522 systemd-logind[1447]: New session 14 of user core. Sep 4 21:38:56.835912 systemd[1]: Started session-14.scope - Session 14 of User core. Sep 4 21:38:56.890021 sshd[1928]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:56.902330 systemd[1]: sshd@12-147.28.180.253:22-139.178.89.65:48846.service: Deactivated successfully. Sep 4 21:38:56.903134 systemd[1]: session-14.scope: Deactivated successfully. Sep 4 21:38:56.903887 systemd-logind[1447]: Session 14 logged out. Waiting for processes to exit. Sep 4 21:38:56.904498 systemd[1]: Started sshd@13-147.28.180.253:22-139.178.89.65:48858.service - OpenSSH per-connection server daemon (139.178.89.65:48858). Sep 4 21:38:56.905150 systemd-logind[1447]: Removed session 14. Sep 4 21:38:56.933477 sshd[1935]: Accepted publickey for core from 139.178.89.65 port 48858 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:38:56.934261 sshd[1935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:38:56.937301 systemd-logind[1447]: New session 15 of user core. Sep 4 21:38:56.946912 systemd[1]: Started session-15.scope - Session 15 of User core. Sep 4 21:38:57.001454 sshd[1935]: pam_unix(sshd:session): session closed for user core Sep 4 21:38:57.002723 systemd[1]: sshd@13-147.28.180.253:22-139.178.89.65:48858.service: Deactivated successfully. Sep 4 21:38:57.003544 systemd[1]: session-15.scope: Deactivated successfully. Sep 4 21:38:57.004262 systemd-logind[1447]: Session 15 logged out. Waiting for processes to exit. Sep 4 21:38:57.004963 systemd-logind[1447]: Removed session 15. Sep 4 21:39:06.837327 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.836Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"c2410338bd90d016"} Sep 4 21:39:06.837327 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.836Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Sep 4 21:39:06.840634 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.840Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8f0f9409ea583684","cluster-id":"51f78b28432ccac"} Sep 4 21:39:06.840634 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.840Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 switched to configuration voters=()"} Sep 4 21:39:06.840634 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.840Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 became follower at term 0"} Sep 4 21:39:06.840634 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.840Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8f0f9409ea583684 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Sep 4 21:39:06.840634 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.840Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 became follower at term 1"} Sep 4 21:39:06.840829 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.840Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 switched to configuration voters=(5265010563480504853)"} Sep 4 21:39:06.840829 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.840Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 switched to configuration voters=(5265010563480504853 10308620842381620868)"} Sep 4 21:39:06.840829 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.840Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 switched to configuration voters=(5265010563480504853 10308620842381620868 13997472659077648406)"} Sep 4 21:39:06.841103 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:06.840Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Sep 4 21:39:06.841552 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.841Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Sep 4 21:39:06.841884 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.841Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Sep 4 21:39:06.842136 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.841Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.842136 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.841Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.842422 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.842Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.842785 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.842Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.843020 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.842Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.843020 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.842Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15","remote-peer-urls":["http://10.67.80.79:2380"]} Sep 4 21:39:06.843020 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.842Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.843020 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.842Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:06.843020 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.842Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:06.843141 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.843189 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:06.843248 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:06.843413 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:06.843465 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:06.843465 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016","remote-peer-urls":["http://10.67.80.83:2380"]} Sep 4 21:39:06.843465 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8f0f9409ea583684","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Sep 4 21:39:06.843465 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:06.843600 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Sep 4 21:39:06.843937 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.843Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 switched to configuration voters=(5265010563480504853 10308620842381620868 13997472659077648406)"} Sep 4 21:39:06.844092 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.844Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"51f78b28432ccac","local-member-id":"8f0f9409ea583684","added-peer-id":"4911133656ef4a15","added-peer-peer-urls":["http://10.67.80.79:2380"]} Sep 4 21:39:06.844092 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.844Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 switched to configuration voters=(5265010563480504853 10308620842381620868 13997472659077648406)"} Sep 4 21:39:06.844168 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.844Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"51f78b28432ccac","local-member-id":"8f0f9409ea583684","added-peer-id":"8f0f9409ea583684","added-peer-peer-urls":["http://10.67.80.81:2380"]} Sep 4 21:39:06.844168 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.844Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 switched to configuration voters=(5265010563480504853 10308620842381620868 13997472659077648406)"} Sep 4 21:39:06.844207 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.844Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"51f78b28432ccac","local-member-id":"8f0f9409ea583684","added-peer-id":"c2410338bd90d016","added-peer-peer-urls":["http://10.67.80.83:2380"]} Sep 4 21:39:06.844890 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.844Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8f0f9409ea583684","initial-advertise-peer-urls":["http://10.67.80.81:2380"],"listen-peer-urls":["http://10.67.80.81:2380"],"advertise-client-urls":["http://10.67.80.81:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Sep 4 21:39:06.844890 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.844Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.81:2380"} Sep 4 21:39:06.844890 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.844Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.81:2380"} Sep 4 21:39:06.845132 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.845Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8f0f9409ea583684","to":"4911133656ef4a15","stream-type":"stream Message"} Sep 4 21:39:06.845132 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.845Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"4911133656ef4a15"} Sep 4 21:39:06.845132 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.845Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.845132 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.845Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8f0f9409ea583684","to":"4911133656ef4a15","stream-type":"stream MsgApp v2"} Sep 4 21:39:06.845132 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.845Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.846243 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.846Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:06.846243 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:06.846Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8f0f9409ea583684","remote-peer-id":"4911133656ef4a15"} Sep 4 21:39:07.047068 systemd[1]: Started sshd@14-147.28.180.253:22-139.178.89.65:37136.service - OpenSSH per-connection server daemon (139.178.89.65:37136). Sep 4 21:39:07.061392 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.061Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8f0f9409ea583684","to":"c2410338bd90d016","stream-type":"stream Message"} Sep 4 21:39:07.061392 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.061Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"c2410338bd90d016"} Sep 4 21:39:07.061392 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.061Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:07.061392 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.061Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8f0f9409ea583684","to":"c2410338bd90d016","stream-type":"stream MsgApp v2"} Sep 4 21:39:07.061392 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.061Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:07.062286 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.062Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:07.062286 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.062Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:07.073758 sshd[1949]: Accepted publickey for core from 139.178.89.65 port 37136 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:39:07.074592 sshd[1949]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:39:07.077470 systemd-logind[1447]: New session 16 of user core. Sep 4 21:39:07.088920 systemd[1]: Started session-16.scope - Session 16 of User core. Sep 4 21:39:07.096928 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.096Z","caller":"etcdserver/server.go:767","msg":"initialized peer connections; fast-forwarding election ticks","local-member-id":"8f0f9409ea583684","forward-ticks":8,"forward-duration":"800ms","election-ticks":10,"election-timeout":"1s","active-remote-members":2} Sep 4 21:39:07.142374 sshd[1949]: pam_unix(sshd:session): session closed for user core Sep 4 21:39:07.158317 systemd[1]: sshd@14-147.28.180.253:22-139.178.89.65:37136.service: Deactivated successfully. Sep 4 21:39:07.159110 systemd[1]: session-16.scope: Deactivated successfully. Sep 4 21:39:07.159881 systemd-logind[1447]: Session 16 logged out. Waiting for processes to exit. Sep 4 21:39:07.160525 systemd[1]: Started sshd@15-147.28.180.253:22-139.178.89.65:37144.service - OpenSSH per-connection server daemon (139.178.89.65:37144). Sep 4 21:39:07.161062 systemd-logind[1447]: Removed session 16. Sep 4 21:39:07.189867 sshd[1956]: Accepted publickey for core from 139.178.89.65 port 37144 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:39:07.193199 sshd[1956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:39:07.204484 systemd-logind[1447]: New session 17 of user core. Sep 4 21:39:07.221095 systemd[1]: Started session-17.scope - Session 17 of User core. Sep 4 21:39:07.291922 sshd[1956]: pam_unix(sshd:session): session closed for user core Sep 4 21:39:07.298228 systemd[1]: sshd@15-147.28.180.253:22-139.178.89.65:37144.service: Deactivated successfully. Sep 4 21:39:07.301982 systemd[1]: session-17.scope: Deactivated successfully. Sep 4 21:39:07.305222 systemd-logind[1447]: Session 17 logged out. Waiting for processes to exit. Sep 4 21:39:07.307847 systemd-logind[1447]: Removed session 17. Sep 4 21:39:07.360558 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.359Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for c2410338bd90d016 [logterm: 1, index: 3] at term 1"} Sep 4 21:39:07.361582 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.361Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 [term: 1] received a MsgVote message with higher term from c2410338bd90d016 [term: 2]"} Sep 4 21:39:07.361582 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.361Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 became follower at term 2"} Sep 4 21:39:07.361582 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.361Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 [logterm: 1, index: 3, vote: 0] cast MsgVote for c2410338bd90d016 [logterm: 1, index: 3] at term 2"} Sep 4 21:39:07.362540 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.362Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8f0f9409ea583684 elected leader c2410338bd90d016 at term 2"} Sep 4 21:39:07.364865 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.364Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8f0f9409ea583684","local-member-attributes":"{Name:0e8ed50beb1f4094a1a387d8a04b8bcb ClientURLs:[http://10.67.80.81:2379]}","request-path":"/0/members/8f0f9409ea583684/attributes","cluster-id":"51f78b28432ccac","publish-timeout":"7s"} Sep 4 21:39:07.364865 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.364Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Sep 4 21:39:07.365063 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.364Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Sep 4 21:39:07.365063 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.364Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Sep 4 21:39:07.365076 systemd[1]: Started etcd-member.service - etcd (System Application Container). Sep 4 21:39:07.365507 systemd[1]: Reached target multi-user.target - Multi-User System. Sep 4 21:39:07.365619 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.365Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"51f78b28432ccac","local-member-id":"8f0f9409ea583684","cluster-version":"3.5"} Sep 4 21:39:07.365619 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.365Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Sep 4 21:39:07.365702 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:07.365Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Sep 4 21:39:07.365662 systemd[1]: Startup finished in 2.662s (kernel) + 7.289s (initrd) + 1min 12.230s (userspace) = 1min 22.182s. Sep 4 21:39:11.843598 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:11.843Z","caller":"rafthttp/probing_status.go:82","msg":"prober found high clock drift","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4911133656ef4a15","clock-drift":"1.133641405s","rtt":"218.53µs"} Sep 4 21:39:11.843598 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:11.843Z","caller":"rafthttp/probing_status.go:82","msg":"prober found high clock drift","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4911133656ef4a15","clock-drift":"1.133474443s","rtt":"224.609µs"} Sep 4 21:39:13.748270 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:13.747Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 [term: 2] received a MsgVote message with higher term from 4911133656ef4a15 [term: 3]"} Sep 4 21:39:13.748270 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:13.747Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 became follower at term 3"} Sep 4 21:39:13.748270 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:13.747Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8f0f9409ea583684 [logterm: 2, index: 8, vote: 0] cast MsgVote for 4911133656ef4a15 [logterm: 2, index: 8] at term 3"} Sep 4 21:39:13.748270 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:13.747Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8f0f9409ea583684 lost leader c2410338bd90d016 at term 3"} Sep 4 21:39:13.748979 etcd-wrapper[1714]: {"level":"info","ts":"2024-09-04T21:39:13.748Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8f0f9409ea583684 elected leader 4911133656ef4a15 at term 3"} Sep 4 21:39:13.834280 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:13.833Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016","error":"EOF"} Sep 4 21:39:13.835405 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:13.834Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016","error":"EOF"} Sep 4 21:39:13.838222 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:13.837Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"c2410338bd90d016","error":"failed to dial c2410338bd90d016 on stream MsgApp v2 (peer c2410338bd90d016 failed to find local node 8f0f9409ea583684)"} Sep 4 21:39:17.337055 systemd[1]: Started sshd@16-147.28.180.253:22-139.178.89.65:51346.service - OpenSSH per-connection server daemon (139.178.89.65:51346). Sep 4 21:39:17.363893 sshd[1964]: Accepted publickey for core from 139.178.89.65 port 51346 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:39:17.364652 sshd[1964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:39:17.367420 systemd-logind[1447]: New session 18 of user core. Sep 4 21:39:17.379918 systemd[1]: Started session-18.scope - Session 18 of User core. Sep 4 21:39:17.433940 sshd[1964]: pam_unix(sshd:session): session closed for user core Sep 4 21:39:17.444319 systemd[1]: sshd@16-147.28.180.253:22-139.178.89.65:51346.service: Deactivated successfully. Sep 4 21:39:17.445095 systemd[1]: session-18.scope: Deactivated successfully. Sep 4 21:39:17.445884 systemd-logind[1447]: Session 18 logged out. Waiting for processes to exit. Sep 4 21:39:17.446538 systemd[1]: Started sshd@17-147.28.180.253:22-139.178.89.65:51350.service - OpenSSH per-connection server daemon (139.178.89.65:51350). Sep 4 21:39:17.447078 systemd-logind[1447]: Removed session 18. Sep 4 21:39:17.476029 sshd[1971]: Accepted publickey for core from 139.178.89.65 port 51350 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:39:17.479268 sshd[1971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:39:17.490570 systemd-logind[1447]: New session 19 of user core. Sep 4 21:39:17.502105 systemd[1]: Started session-19.scope - Session 19 of User core. Sep 4 21:39:17.561372 sshd[1971]: pam_unix(sshd:session): session closed for user core Sep 4 21:39:17.579420 systemd[1]: sshd@17-147.28.180.253:22-139.178.89.65:51350.service: Deactivated successfully. Sep 4 21:39:17.583062 systemd[1]: session-19.scope: Deactivated successfully. Sep 4 21:39:17.586490 systemd-logind[1447]: Session 19 logged out. Waiting for processes to exit. Sep 4 21:39:17.598408 systemd[1]: Started sshd@18-147.28.180.253:22-139.178.89.65:43126.service - OpenSSH per-connection server daemon (139.178.89.65:43126). Sep 4 21:39:17.600592 systemd-logind[1447]: Removed session 19. Sep 4 21:39:17.655055 sshd[1978]: Accepted publickey for core from 139.178.89.65 port 43126 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:39:17.658332 sshd[1978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:39:17.669331 systemd-logind[1447]: New session 20 of user core. Sep 4 21:39:17.682096 systemd[1]: Started session-20.scope - Session 20 of User core. Sep 4 21:39:17.752304 sshd[1978]: pam_unix(sshd:session): session closed for user core Sep 4 21:39:17.771432 systemd[1]: sshd@18-147.28.180.253:22-139.178.89.65:43126.service: Deactivated successfully. Sep 4 21:39:17.775174 systemd[1]: session-20.scope: Deactivated successfully. Sep 4 21:39:17.778650 systemd-logind[1447]: Session 20 logged out. Waiting for processes to exit. Sep 4 21:39:17.790738 systemd[1]: Started sshd@19-147.28.180.253:22-139.178.89.65:43140.service - OpenSSH per-connection server daemon (139.178.89.65:43140). Sep 4 21:39:17.793258 systemd-logind[1447]: Removed session 20. Sep 4 21:39:17.867646 sshd[1988]: Accepted publickey for core from 139.178.89.65 port 43140 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:39:17.870982 sshd[1988]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:39:17.882371 systemd-logind[1447]: New session 21 of user core. Sep 4 21:39:17.898054 systemd[1]: Started session-21.scope - Session 21 of User core. Sep 4 21:39:17.968389 sudo[1992]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 4 21:39:17.968526 sudo[1992]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 4 21:39:17.980226 sudo[1992]: pam_unix(sudo:session): session closed for user root Sep 4 21:39:17.981228 sshd[1988]: pam_unix(sshd:session): session closed for user core Sep 4 21:39:17.993576 systemd[1]: sshd@19-147.28.180.253:22-139.178.89.65:43140.service: Deactivated successfully. Sep 4 21:39:17.994515 systemd[1]: session-21.scope: Deactivated successfully. Sep 4 21:39:17.995421 systemd-logind[1447]: Session 21 logged out. Waiting for processes to exit. Sep 4 21:39:17.996353 systemd[1]: Started sshd@20-147.28.180.253:22-139.178.89.65:43142.service - OpenSSH per-connection server daemon (139.178.89.65:43142). Sep 4 21:39:17.997161 systemd-logind[1447]: Removed session 21. Sep 4 21:39:18.031161 sshd[1997]: Accepted publickey for core from 139.178.89.65 port 43142 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU Sep 4 21:39:18.032307 sshd[1997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 4 21:39:18.036484 systemd-logind[1447]: New session 22 of user core. Sep 4 21:39:18.046954 systemd[1]: Started session-22.scope - Session 22 of User core. Sep 4 21:39:18.102326 sudo[2001]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 4 21:39:18.102473 sudo[2001]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 4 21:39:18.104463 sudo[2001]: pam_unix(sudo:session): session closed for user root Sep 4 21:39:18.107176 sudo[2000]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 4 21:39:18.107325 sudo[2000]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 4 21:39:18.123912 systemd[1]: Stopping audit-rules.service - Load Security Auditing Rules... Sep 4 21:39:18.124847 auditctl[2004]: No rules Sep 4 21:39:18.125070 systemd[1]: audit-rules.service: Deactivated successfully. Sep 4 21:39:18.125208 systemd[1]: Stopped audit-rules.service - Load Security Auditing Rules. Sep 4 21:39:18.126874 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Sep 4 21:39:18.143009 augenrules[2022]: No rules Sep 4 21:39:18.143402 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Sep 4 21:39:18.143979 sudo[2000]: pam_unix(sudo:session): session closed for user root Sep 4 21:39:18.144881 sshd[1997]: pam_unix(sshd:session): session closed for user core Sep 4 21:39:18.146809 systemd[1]: sshd@20-147.28.180.253:22-139.178.89.65:43142.service: Deactivated successfully. Sep 4 21:39:18.147735 systemd[1]: session-22.scope: Deactivated successfully. Sep 4 21:39:18.148191 systemd-logind[1447]: Session 22 logged out. Waiting for processes to exit. Sep 4 21:39:18.148791 systemd-logind[1447]: Removed session 22. Sep 4 21:39:20.178032 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:20.177Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:20.178032 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:20.177Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8f0f9409ea583684","remote-peer-id":"c2410338bd90d016"} Sep 4 21:39:21.458791 systemd[1]: Started sshd@21-147.28.180.253:22-180.101.88.239:28268.service - OpenSSH per-connection server daemon (180.101.88.239:28268). Sep 4 21:39:30.855025 sshd[2030]: Received disconnect from 180.101.88.239 port 28268:11: [preauth] Sep 4 21:39:30.855025 sshd[2030]: Disconnected from 180.101.88.239 port 28268 [preauth] Sep 4 21:39:30.857170 systemd[1]: sshd@21-147.28.180.253:22-180.101.88.239:28268.service: Deactivated successfully. Sep 4 21:39:37.118232 systemd[1]: Started sshd@22-147.28.180.253:22-85.209.11.254:50898.service - OpenSSH per-connection server daemon (85.209.11.254:50898). Sep 4 21:39:38.650075 sshd[2037]: Invalid user anonymous from 85.209.11.254 port 50898 Sep 4 21:39:38.928490 sshd[2037]: Connection closed by invalid user anonymous 85.209.11.254 port 50898 [preauth] Sep 4 21:39:38.931478 systemd[1]: sshd@22-147.28.180.253:22-85.209.11.254:50898.service: Deactivated successfully. Sep 4 21:39:41.845815 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:41.845Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:39:41.845815 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:41.845Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:39:46.846172 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:46.845Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:39:46.846172 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:46.845Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:39:51.397173 systemd[1]: Started sshd@23-147.28.180.253:22-193.32.162.65:33470.service - OpenSSH per-connection server daemon (193.32.162.65:33470). Sep 4 21:39:51.846807 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:51.846Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:39:51.846807 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:51.846Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:39:52.122210 sshd[2042]: Invalid user hadoop from 193.32.162.65 port 33470 Sep 4 21:39:52.299046 sshd[2042]: Connection closed by invalid user hadoop 193.32.162.65 port 33470 [preauth] Sep 4 21:39:52.300585 systemd[1]: sshd@23-147.28.180.253:22-193.32.162.65:33470.service: Deactivated successfully. Sep 4 21:39:56.847017 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:56.846Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:39:56.847017 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:39:56.846Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:01.847694 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:01.847Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:01.847694 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:01.847Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:06.848566 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:06.848Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:06.848566 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:06.848Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:11.849615 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:11.848Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:11.849615 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:11.849Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:16.850076 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:16.849Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:16.850076 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:16.849Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:21.850901 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:21.850Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:21.850901 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:21.850Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:26.851462 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:26.850Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:26.851462 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:26.850Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:31.852057 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:31.851Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:31.852057 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:31.851Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:36.852300 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:36.851Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:36.852300 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:36.851Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:41.853020 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:41.852Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:41.853020 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:41.852Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:46.041149 systemd[1]: Started sshd@24-147.28.180.253:22-180.101.88.239:16138.service - OpenSSH per-connection server daemon (180.101.88.239:16138). Sep 4 21:40:46.853556 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:46.852Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:46.853556 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:46.853Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:49.713715 sshd[2050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:40:51.853811 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:51.853Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:51.853811 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:51.853Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:52.018828 sshd[2048]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:40:52.308079 sshd[2051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:40:53.689146 sshd[2048]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:40:53.982630 sshd[2052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:40:56.171984 sshd[2048]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:40:56.323330 sshd[2048]: Received disconnect from 180.101.88.239 port 16138:11: [preauth] Sep 4 21:40:56.323330 sshd[2048]: Disconnected from authenticating user root 180.101.88.239 port 16138 [preauth] Sep 4 21:40:56.326735 systemd[1]: sshd@24-147.28.180.253:22-180.101.88.239:16138.service: Deactivated successfully. Sep 4 21:40:56.854373 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:56.853Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:40:56.854373 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:40:56.853Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:01.855295 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:01.854Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:01.855295 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:01.854Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:06.856031 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:06.855Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:06.856031 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:06.855Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:11.856217 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:11.855Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:11.856217 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:11.855Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:16.857175 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:16.856Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:16.857175 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:16.856Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:21.858144 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:21.857Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:21.858144 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:21.857Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:26.858611 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:26.858Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:26.858611 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:26.858Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:31.859436 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:31.858Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:31.859436 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:31.858Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:36.860717 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:36.860Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:36.860717 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:36.860Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:41.861895 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:41.861Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:41.861895 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:41.861Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:46.862318 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:46.861Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:46.862318 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:46.861Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:51.863518 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:51.862Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:51.863518 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:51.863Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:56.864269 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:56.863Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:56.864269 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:41:56.863Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:41:56.989777 systemd[1]: Started sshd@25-147.28.180.253:22-180.101.88.239:48444.service - OpenSSH per-connection server daemon (180.101.88.239:48444). Sep 4 21:42:01.343089 sshd[2058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:42:01.865248 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:01.864Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:01.865248 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:01.864Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:03.592735 sshd[2056]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:42:03.897754 sshd[2059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:42:03.898240 sshd[2059]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:42:05.696076 sshd[2056]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:42:06.459108 sshd[2060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:42:06.865886 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:06.865Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:06.865886 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:06.865Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:08.197284 sshd[2056]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:42:08.342756 sshd[2056]: Received disconnect from 180.101.88.239 port 48444:11: [preauth] Sep 4 21:42:08.342756 sshd[2056]: Disconnected from authenticating user root 180.101.88.239 port 48444 [preauth] Sep 4 21:42:08.346142 systemd[1]: sshd@25-147.28.180.253:22-180.101.88.239:48444.service: Deactivated successfully. Sep 4 21:42:11.867699 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:11.866Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:11.867699 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:11.866Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:16.867680 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:16.867Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:16.867680 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:16.867Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:21.868122 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:21.867Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:21.868122 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:21.867Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:26.868496 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:26.867Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:26.868496 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:26.868Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:31.868980 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:31.868Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:31.868980 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:31.868Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:36.869894 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:36.869Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:36.869894 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:36.869Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:41.870970 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:41.870Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:41.870970 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:41.870Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:46.872074 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:46.871Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:46.872074 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:46.871Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:51.872526 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:51.871Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:51.872526 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:51.872Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:56.873414 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:56.872Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:42:56.873414 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:42:56.872Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:01.873692 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:01.873Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:01.873692 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:01.873Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:06.874368 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:06.873Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:06.874368 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:06.873Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:11.875496 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:11.874Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:11.875496 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:11.874Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:16.876308 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:16.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:16.876308 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:16.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:21.876915 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:21.876Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:21.876915 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:21.876Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:26.877696 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:26.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:26.877696 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:26.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:31.877890 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:31.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:31.877890 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:31.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:34.896483 systemd[1]: Started sshd@26-147.28.180.253:22-180.101.88.239:62145.service - OpenSSH per-connection server daemon (180.101.88.239:62145). Sep 4 21:43:36.878310 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:36.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:36.878310 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:36.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:40.647114 sshd[2070]: Received disconnect from 180.101.88.239 port 62145:11: [preauth] Sep 4 21:43:40.647114 sshd[2070]: Disconnected from 180.101.88.239 port 62145 [preauth] Sep 4 21:43:40.649283 systemd[1]: sshd@26-147.28.180.253:22-180.101.88.239:62145.service: Deactivated successfully. Sep 4 21:43:41.878624 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:41.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:41.878624 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:41.878Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:46.879826 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:46.879Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:46.879826 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:46.879Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:51.881046 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:51.880Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:51.881046 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:51.880Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:56.882220 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:56.881Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:43:56.882220 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:43:56.881Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:01.883261 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:01.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:01.883261 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:01.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:06.883691 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:06.883Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:06.883691 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:06.883Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:11.884432 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:11.883Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:11.884432 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:11.883Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:16.885266 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:16.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:16.885266 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:16.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:21.886384 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:21.885Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:21.886384 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:21.885Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:26.886603 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:26.885Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:26.886603 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:26.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:31.887151 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:31.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:31.887151 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:31.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:36.887621 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:36.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:36.887621 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:36.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:39.372781 systemd[1]: Started sshd@27-147.28.180.253:22-180.101.88.239:18469.service - OpenSSH per-connection server daemon (180.101.88.239:18469). Sep 4 21:44:41.888497 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:41.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:41.888497 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:41.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:42.131039 sshd[2077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:44:44.285480 sshd[2075]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:44:45.990964 sshd[2078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:44:46.888702 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:46.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:46.888702 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:46.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:47.693761 sshd[2075]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:44:47.990897 sshd[2079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:44:49.969636 sshd[2075]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:44:50.118849 sshd[2075]: Received disconnect from 180.101.88.239 port 18469:11: [preauth] Sep 4 21:44:50.118849 sshd[2075]: Disconnected from authenticating user root 180.101.88.239 port 18469 [preauth] Sep 4 21:44:50.122253 systemd[1]: sshd@27-147.28.180.253:22-180.101.88.239:18469.service: Deactivated successfully. Sep 4 21:44:51.889445 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:51.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:51.889445 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:51.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:56.890276 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:56.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:44:56.890276 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:44:56.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:01.891086 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:01.890Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:01.891086 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:01.890Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:06.892235 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:06.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:06.892235 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:06.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:11.892681 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:11.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:11.892681 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:11.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:16.893826 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:16.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:16.893826 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:16.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:21.894293 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:21.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:21.894293 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:21.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:26.894569 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:26.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:26.894569 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:26.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:31.895196 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:31.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:31.895196 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:31.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:36.896241 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:36.895Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:36.896241 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:36.895Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:41.897465 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:41.896Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:41.897465 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:41.896Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:46.898204 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:46.897Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:46.898204 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:46.897Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:51.899460 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:51.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:51.899460 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:51.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:55.933530 systemd[1]: Started sshd@28-147.28.180.253:22-180.101.88.239:23652.service - OpenSSH per-connection server daemon (180.101.88.239:23652). Sep 4 21:45:56.899791 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:56.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:56.899791 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:45:56.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:45:57.063346 sshd[2086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:45:58.179332 sshd[2084]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:45:58.475372 sshd[2087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:45:58.475789 sshd[2087]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:45:59.055454 systemd[1]: Started sshd@29-147.28.180.253:22-193.32.162.65:36850.service - OpenSSH per-connection server daemon (193.32.162.65:36850). Sep 4 21:45:59.767066 sshd[2089]: Invalid user hadoop from 193.32.162.65 port 36850 Sep 4 21:45:59.941495 sshd[2089]: Connection closed by invalid user hadoop 193.32.162.65 port 36850 [preauth] Sep 4 21:45:59.944567 systemd[1]: sshd@29-147.28.180.253:22-193.32.162.65:36850.service: Deactivated successfully. Sep 4 21:46:00.198552 sshd[2084]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:46:00.491079 sshd[2093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:46:01.900349 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:01.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:01.900349 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:01.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:03.157445 sshd[2084]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:46:03.302567 sshd[2084]: Received disconnect from 180.101.88.239 port 23652:11: [preauth] Sep 4 21:46:03.302567 sshd[2084]: Disconnected from authenticating user root 180.101.88.239 port 23652 [preauth] Sep 4 21:46:03.306080 systemd[1]: sshd@28-147.28.180.253:22-180.101.88.239:23652.service: Deactivated successfully. Sep 4 21:46:06.900479 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:06.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:06.900479 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:06.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:11.902006 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:11.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:11.902006 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:11.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:16.901786 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:16.901Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:16.901786 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:16.901Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:21.902844 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:21.902Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:21.902844 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:21.902Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:26.903509 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:26.902Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:26.903509 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:26.902Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:31.903888 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:31.903Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:31.903888 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:31.903Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:36.904157 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:36.903Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:36.904157 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:36.903Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:41.905130 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:41.904Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:41.905130 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:41.904Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:46.905708 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:46.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:46.905708 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:46.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:51.905898 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:51.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:51.905898 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:51.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:56.906105 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:56.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:46:56.906105 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:46:56.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:01.906402 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:01.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:01.906402 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:01.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:06.906699 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:06.906Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:06.906699 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:06.906Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:08.391982 systemd[1]: Started sshd@30-147.28.180.253:22-180.101.88.239:50054.service - OpenSSH per-connection server daemon (180.101.88.239:50054). Sep 4 21:47:11.907824 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:11.907Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:11.907824 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:11.907Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:11.939571 sshd[2100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:47:14.019067 sshd[2098]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:47:14.693087 sshd[2101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:47:14.693444 sshd[2101]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:47:16.516719 sshd[2098]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:47:16.825753 sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:47:16.908914 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:16.908Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:16.908914 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:16.908Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:18.257858 sshd[2098]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:47:18.407616 sshd[2098]: Received disconnect from 180.101.88.239 port 50054:11: [preauth] Sep 4 21:47:18.407616 sshd[2098]: Disconnected from authenticating user root 180.101.88.239 port 50054 [preauth] Sep 4 21:47:18.411027 systemd[1]: sshd@30-147.28.180.253:22-180.101.88.239:50054.service: Deactivated successfully. Sep 4 21:47:21.909119 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:21.908Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:21.909119 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:21.908Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:26.909898 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:26.909Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:26.909898 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:26.909Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:31.910366 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:31.909Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:31.910366 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:31.909Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:36.911173 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:36.910Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:36.911173 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:36.910Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:41.911547 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:41.910Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:41.911547 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:41.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:46.911962 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:46.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:46.911962 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:46.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:51.912282 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:51.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:51.912282 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:51.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:56.913117 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:56.912Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:47:56.913117 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:47:56.912Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:01.913377 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:01.912Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:01.913377 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:01.912Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:06.913915 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:06.913Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:06.913915 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:06.913Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:11.915080 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:11.914Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:11.915080 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:11.914Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:16.916003 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:16.915Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:16.916003 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:16.915Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:21.916554 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:21.915Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:21.916554 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:21.916Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:26.917189 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:26.916Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:26.917189 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:26.916Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:28.806506 systemd[1]: Started sshd@31-147.28.180.253:22-180.101.88.239:58729.service - OpenSSH per-connection server daemon (180.101.88.239:58729). Sep 4 21:48:31.918292 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:31.917Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:31.918292 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:31.917Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:32.572229 sshd[2113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:48:34.771901 sshd[2111]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:48:35.063652 sshd[2114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:48:35.064044 sshd[2114]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:48:36.536034 sshd[2111]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:48:36.918842 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:36.918Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:36.918842 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:36.918Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:38.419720 sshd[2115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:48:40.503443 sshd[2111]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:48:40.648832 sshd[2111]: Received disconnect from 180.101.88.239 port 58729:11: [preauth] Sep 4 21:48:40.648832 sshd[2111]: Disconnected from authenticating user root 180.101.88.239 port 58729 [preauth] Sep 4 21:48:40.652249 systemd[1]: sshd@31-147.28.180.253:22-180.101.88.239:58729.service: Deactivated successfully. Sep 4 21:48:41.919142 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:41.918Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:41.919142 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:41.918Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:46.919325 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:46.918Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:46.919325 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:46.918Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:51.920093 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:51.919Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:51.920093 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:51.919Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:56.283313 update_engine[1452]: I0904 21:48:56.283195 1452 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Sep 4 21:48:56.283313 update_engine[1452]: I0904 21:48:56.283277 1452 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Sep 4 21:48:56.284375 update_engine[1452]: I0904 21:48:56.283743 1452 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Sep 4 21:48:56.284892 update_engine[1452]: I0904 21:48:56.284816 1452 omaha_request_params.cc:62] Current group set to stable Sep 4 21:48:56.285089 update_engine[1452]: I0904 21:48:56.285051 1452 update_attempter.cc:499] Already updated boot flags. Skipping. Sep 4 21:48:56.285089 update_engine[1452]: I0904 21:48:56.285068 1452 update_attempter.cc:643] Scheduling an action processor start. Sep 4 21:48:56.285270 update_engine[1452]: I0904 21:48:56.285096 1452 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 4 21:48:56.285270 update_engine[1452]: I0904 21:48:56.285164 1452 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Sep 4 21:48:56.285433 update_engine[1452]: I0904 21:48:56.285310 1452 omaha_request_action.cc:271] Posting an Omaha request to disabled Sep 4 21:48:56.285433 update_engine[1452]: I0904 21:48:56.285327 1452 omaha_request_action.cc:272] Request: Sep 4 21:48:56.285433 update_engine[1452]: Sep 4 21:48:56.285433 update_engine[1452]: Sep 4 21:48:56.285433 update_engine[1452]: Sep 4 21:48:56.285433 update_engine[1452]: Sep 4 21:48:56.285433 update_engine[1452]: Sep 4 21:48:56.285433 update_engine[1452]: Sep 4 21:48:56.285433 update_engine[1452]: Sep 4 21:48:56.285433 update_engine[1452]: Sep 4 21:48:56.285433 update_engine[1452]: I0904 21:48:56.285337 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 4 21:48:56.286319 locksmithd[1489]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Sep 4 21:48:56.288399 update_engine[1452]: I0904 21:48:56.288363 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 4 21:48:56.288578 update_engine[1452]: I0904 21:48:56.288547 1452 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 4 21:48:56.289549 update_engine[1452]: E0904 21:48:56.289512 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 4 21:48:56.289580 update_engine[1452]: I0904 21:48:56.289553 1452 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Sep 4 21:48:56.921255 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:56.920Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:48:56.921255 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:48:56.920Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:01.922281 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:01.921Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:01.922281 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:01.921Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:06.194006 update_engine[1452]: I0904 21:49:06.193874 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 4 21:49:06.194854 update_engine[1452]: I0904 21:49:06.194286 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 4 21:49:06.194854 update_engine[1452]: I0904 21:49:06.194783 1452 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 4 21:49:06.195519 update_engine[1452]: E0904 21:49:06.195428 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 4 21:49:06.195728 update_engine[1452]: I0904 21:49:06.195539 1452 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Sep 4 21:49:06.923254 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:06.922Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:06.923254 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:06.922Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:11.924350 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:11.923Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:11.924350 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:11.923Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:16.194102 update_engine[1452]: I0904 21:49:16.193981 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 4 21:49:16.194953 update_engine[1452]: I0904 21:49:16.194389 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 4 21:49:16.194953 update_engine[1452]: I0904 21:49:16.194885 1452 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 4 21:49:16.195676 update_engine[1452]: E0904 21:49:16.195566 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 4 21:49:16.195864 update_engine[1452]: I0904 21:49:16.195701 1452 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Sep 4 21:49:16.925330 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:16.924Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:16.925330 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:16.924Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:21.925495 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:21.924Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:21.925495 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:21.924Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:26.186248 update_engine[1452]: I0904 21:49:26.186110 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 4 21:49:26.187037 update_engine[1452]: I0904 21:49:26.186527 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 4 21:49:26.187037 update_engine[1452]: I0904 21:49:26.187009 1452 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 4 21:49:26.187865 update_engine[1452]: E0904 21:49:26.187776 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 4 21:49:26.188081 update_engine[1452]: I0904 21:49:26.187882 1452 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 4 21:49:26.188081 update_engine[1452]: I0904 21:49:26.187898 1452 omaha_request_action.cc:617] Omaha request response: Sep 4 21:49:26.188081 update_engine[1452]: E0904 21:49:26.188053 1452 omaha_request_action.cc:636] Omaha request network transfer failed. Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188091 1452 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188102 1452 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188112 1452 update_attempter.cc:306] Processing Done. Sep 4 21:49:26.188388 update_engine[1452]: E0904 21:49:26.188138 1452 update_attempter.cc:619] Update failed. Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188148 1452 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188155 1452 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188164 1452 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188309 1452 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188356 1452 omaha_request_action.cc:271] Posting an Omaha request to disabled Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188365 1452 omaha_request_action.cc:272] Request: Sep 4 21:49:26.188388 update_engine[1452]: Sep 4 21:49:26.188388 update_engine[1452]: Sep 4 21:49:26.188388 update_engine[1452]: Sep 4 21:49:26.188388 update_engine[1452]: Sep 4 21:49:26.188388 update_engine[1452]: Sep 4 21:49:26.188388 update_engine[1452]: Sep 4 21:49:26.188388 update_engine[1452]: I0904 21:49:26.188375 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 4 21:49:26.189928 update_engine[1452]: I0904 21:49:26.188673 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 4 21:49:26.189928 update_engine[1452]: I0904 21:49:26.189028 1452 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 4 21:49:26.189928 update_engine[1452]: E0904 21:49:26.189729 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 4 21:49:26.189928 update_engine[1452]: I0904 21:49:26.189828 1452 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 4 21:49:26.189928 update_engine[1452]: I0904 21:49:26.189843 1452 omaha_request_action.cc:617] Omaha request response: Sep 4 21:49:26.189928 update_engine[1452]: I0904 21:49:26.189853 1452 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 4 21:49:26.189928 update_engine[1452]: I0904 21:49:26.189862 1452 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 4 21:49:26.189928 update_engine[1452]: I0904 21:49:26.189868 1452 update_attempter.cc:306] Processing Done. Sep 4 21:49:26.189928 update_engine[1452]: I0904 21:49:26.189878 1452 update_attempter.cc:310] Error event sent. Sep 4 21:49:26.189928 update_engine[1452]: I0904 21:49:26.189893 1452 update_check_scheduler.cc:74] Next update check in 47m3s Sep 4 21:49:26.190910 locksmithd[1489]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Sep 4 21:49:26.190910 locksmithd[1489]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Sep 4 21:49:26.925774 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:26.925Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:26.925774 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:26.925Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:31.926997 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:31.926Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:31.926997 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:31.926Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:36.927223 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:36.926Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:36.927223 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:36.926Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:41.928379 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:41.927Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:41.928379 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:41.927Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:45.559554 systemd[1]: Started sshd@32-147.28.180.253:22-180.101.88.239:57102.service - OpenSSH per-connection server daemon (180.101.88.239:57102). Sep 4 21:49:46.713331 sshd[2121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:49:46.929010 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:46.928Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:46.929010 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:46.928Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:49.073359 sshd[2119]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:49:49.381514 sshd[2122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:49:49.381922 sshd[2122]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:49:51.485943 sshd[2119]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:49:51.929961 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:51.929Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:51.929961 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:51.929Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:53.404842 sshd[2123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:49:55.449013 sshd[2119]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:49:55.596034 sshd[2119]: Received disconnect from 180.101.88.239 port 57102:11: [preauth] Sep 4 21:49:55.596034 sshd[2119]: Disconnected from authenticating user root 180.101.88.239 port 57102 [preauth] Sep 4 21:49:55.599432 systemd[1]: sshd@32-147.28.180.253:22-180.101.88.239:57102.service: Deactivated successfully. Sep 4 21:49:56.930906 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:56.930Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:49:56.930906 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:49:56.930Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:01.932060 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:01.931Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:01.932060 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:01.931Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:06.933063 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:06.932Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:06.933063 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:06.932Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:11.933934 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:11.932Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:11.933934 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:11.932Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:16.934261 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:16.933Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:16.934261 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:16.933Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:17.398507 systemd[1]: Started sshd@33-147.28.180.253:22-84.156.61.77:43233.service - OpenSSH per-connection server daemon (84.156.61.77:43233). Sep 4 21:50:21.935414 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:21.934Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:21.935414 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:21.934Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:22.681957 sshd[2129]: Connection closed by 84.156.61.77 port 43233 Sep 4 21:50:22.683467 systemd[1]: sshd@33-147.28.180.253:22-84.156.61.77:43233.service: Deactivated successfully. Sep 4 21:50:26.935574 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:26.934Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:26.935574 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:26.935Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:27.928941 systemd[1]: Started sshd@34-147.28.180.253:22-84.156.61.77:19463.service - OpenSSH per-connection server daemon (84.156.61.77:19463). Sep 4 21:50:29.005022 sshd[2133]: Invalid user from 84.156.61.77 port 19463 Sep 4 21:50:29.020087 sshd[2133]: Postponed keyboard-interactive for invalid user from 84.156.61.77 port 19463 ssh2 [preauth] Sep 4 21:50:29.184575 sshd[2133]: Connection closed by invalid user 84.156.61.77 port 19463 [preauth] Sep 4 21:50:29.188650 systemd[1]: sshd@34-147.28.180.253:22-84.156.61.77:19463.service: Deactivated successfully. Sep 4 21:50:31.936291 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:31.935Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:31.936291 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:31.935Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:36.936811 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:36.936Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:36.936811 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:36.936Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:41.937989 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:41.937Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:41.937989 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:41.937Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:46.939107 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:46.938Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:46.939107 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:46.938Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:51.939424 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:51.938Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:51.939424 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:51.938Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:56.939840 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:56.939Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:50:56.939840 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:50:56.939Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:01.940099 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:01.939Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:01.940099 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:01.939Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:06.240708 systemd[1]: Started sshd@35-147.28.180.253:22-180.101.88.239:22906.service - OpenSSH per-connection server daemon (180.101.88.239:22906). Sep 4 21:51:06.941044 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:06.940Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:06.941044 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:06.940Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:07.635123 sshd[2141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:51:09.779122 sshd[2139]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:51:10.070503 sshd[2142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:51:10.071010 sshd[2142]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:51:11.941917 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:11.941Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:11.941917 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:11.941Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:12.154965 sshd[2139]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:51:12.446124 sshd[2143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:51:13.942967 sshd[2139]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:51:14.087849 sshd[2139]: Received disconnect from 180.101.88.239 port 22906:11: [preauth] Sep 4 21:51:14.087849 sshd[2139]: Disconnected from authenticating user root 180.101.88.239 port 22906 [preauth] Sep 4 21:51:14.091216 systemd[1]: sshd@35-147.28.180.253:22-180.101.88.239:22906.service: Deactivated successfully. Sep 4 21:51:16.942914 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:16.942Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:16.942914 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:16.942Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:21.943139 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:21.942Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:21.943139 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:21.942Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:26.943911 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:26.943Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:26.943911 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:26.943Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:31.945055 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:31.944Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:31.945055 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:31.944Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:36.945723 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:36.945Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:36.945723 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:36.945Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:41.946690 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:41.946Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:41.946690 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:41.946Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:46.947119 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:46.946Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:46.947119 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:46.946Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:51.947594 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:51.946Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:51.947594 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:51.947Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:56.948297 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:56.947Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:51:56.948297 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:51:56.947Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:01.949355 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:01.948Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:01.949355 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:01.948Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:05.373826 systemd[1]: Started sshd@36-147.28.180.253:22-193.32.162.65:40230.service - OpenSSH per-connection server daemon (193.32.162.65:40230). Sep 4 21:52:06.080384 sshd[2147]: Invalid user ansible from 193.32.162.65 port 40230 Sep 4 21:52:06.255784 sshd[2147]: Connection closed by invalid user ansible 193.32.162.65 port 40230 [preauth] Sep 4 21:52:06.258873 systemd[1]: sshd@36-147.28.180.253:22-193.32.162.65:40230.service: Deactivated successfully. Sep 4 21:52:06.949566 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:06.948Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:06.949566 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:06.949Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:11.951236 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:11.950Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:11.951236 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:11.950Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:16.951789 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:16.951Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:16.951789 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:16.951Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:21.952638 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:21.952Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:21.952638 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:21.952Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:21.996734 systemd[1]: Started sshd@37-147.28.180.253:22-180.101.88.239:51128.service - OpenSSH per-connection server daemon (180.101.88.239:51128). Sep 4 21:52:26.583332 sshd[2154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:52:26.953647 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:26.953Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:26.953647 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:26.953Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:29.239870 sshd[2152]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:52:30.494020 sshd[2155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:52:30.494390 sshd[2155]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:52:31.953799 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:31.953Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:31.953799 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:31.953Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:32.563061 sshd[2152]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:52:32.878197 sshd[2156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:52:34.691294 sshd[2152]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:52:34.850282 sshd[2152]: Received disconnect from 180.101.88.239 port 51128:11: [preauth] Sep 4 21:52:34.850282 sshd[2152]: Disconnected from authenticating user root 180.101.88.239 port 51128 [preauth] Sep 4 21:52:34.855167 systemd[1]: sshd@37-147.28.180.253:22-180.101.88.239:51128.service: Deactivated successfully. Sep 4 21:52:36.954557 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:36.953Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:36.954557 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:36.954Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:41.955624 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:41.955Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:41.955624 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:41.955Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:46.956592 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:46.956Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:46.956592 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:46.956Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:51.957334 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:51.956Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:51.957334 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:51.956Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:56.958436 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:56.957Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:56.958436 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:52:56.957Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:52:58.265986 systemd[1]: Starting systemd-tmpfiles-clean.service - Cleanup of Temporary Directories... Sep 4 21:52:58.273656 systemd-tmpfiles[2159]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 4 21:52:58.273936 systemd-tmpfiles[2159]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Sep 4 21:52:58.274395 systemd-tmpfiles[2159]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 4 21:52:58.274566 systemd-tmpfiles[2159]: ACLs are not supported, ignoring. Sep 4 21:52:58.274603 systemd-tmpfiles[2159]: ACLs are not supported, ignoring. Sep 4 21:52:58.280718 systemd-tmpfiles[2159]: Detected autofs mount point /boot during canonicalization of boot. Sep 4 21:52:58.280723 systemd-tmpfiles[2159]: Skipping /boot Sep 4 21:52:58.283432 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Sep 4 21:52:58.283542 systemd[1]: Finished systemd-tmpfiles-clean.service - Cleanup of Temporary Directories. Sep 4 21:53:01.959759 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:01.958Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:01.959759 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:01.959Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:06.960142 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:06.959Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:06.960142 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:06.959Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:11.960267 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:11.959Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:11.960267 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:11.959Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:16.960705 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:16.960Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:16.960705 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:16.960Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:21.961365 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:21.960Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:21.961365 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:21.960Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:26.962116 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:26.961Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:26.962116 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:26.961Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:31.962807 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:31.962Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:31.962807 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:31.962Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:36.963172 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:36.962Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:36.963172 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:36.962Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:41.963988 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:41.963Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:41.963988 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:41.963Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:45.226766 systemd[1]: Started sshd@38-147.28.180.253:22-180.101.88.239:31976.service - OpenSSH per-connection server daemon (180.101.88.239:31976). Sep 4 21:53:46.964881 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:46.964Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:46.964881 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:46.964Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:50.384323 sshd[2167]: Received disconnect from 180.101.88.239 port 31976:11: [preauth] Sep 4 21:53:50.384323 sshd[2167]: Disconnected from 180.101.88.239 port 31976 [preauth] Sep 4 21:53:50.386394 systemd[1]: sshd@38-147.28.180.253:22-180.101.88.239:31976.service: Deactivated successfully. Sep 4 21:53:51.965440 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:51.964Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:51.965440 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:51.964Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:56.965572 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:56.965Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:53:56.965572 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:53:56.965Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:01.965848 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:01.965Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:01.965848 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:01.965Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:06.966188 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:06.965Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:06.966188 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:06.965Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:11.966375 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:11.965Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:11.966375 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:11.965Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:16.967252 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:16.966Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:16.967252 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:16.966Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:21.967424 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:21.966Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:21.967424 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:21.966Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:26.967922 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:26.967Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:26.967922 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:26.967Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:31.969086 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:31.968Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:31.969086 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:31.968Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:36.970022 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:36.969Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:36.970022 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:36.969Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:41.970877 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:41.970Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:41.970877 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:41.970Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:46.971184 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:46.970Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:46.971184 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:46.970Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:51.971716 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:51.971Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:51.971716 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:51.971Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:56.971943 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:56.971Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:54:56.971943 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:54:56.971Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:01.972817 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:01.972Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:01.972817 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:01.972Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:02.737970 systemd[1]: Started sshd@39-147.28.180.253:22-180.101.88.239:36071.service - OpenSSH per-connection server daemon (180.101.88.239:36071). Sep 4 21:55:03.852408 sshd[2174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:55:05.730783 sshd[2172]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:55:06.024043 sshd[2175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:55:06.973694 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:06.973Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:06.973694 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:06.973Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:07.840943 sshd[2172]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:55:08.145313 sshd[2176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:55:10.570792 sshd[2172]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:55:10.718345 sshd[2172]: Received disconnect from 180.101.88.239 port 36071:11: [preauth] Sep 4 21:55:10.718345 sshd[2172]: Disconnected from authenticating user root 180.101.88.239 port 36071 [preauth] Sep 4 21:55:10.721738 systemd[1]: sshd@39-147.28.180.253:22-180.101.88.239:36071.service: Deactivated successfully. Sep 4 21:55:11.974512 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:11.973Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:11.974512 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:11.973Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:16.975605 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:16.975Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:16.975605 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:16.975Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:21.975861 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:21.975Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:21.975861 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:21.975Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:26.976614 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:26.976Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:26.976614 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:26.976Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:31.977596 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:31.976Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:31.977596 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:31.977Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:36.978704 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:36.978Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:36.978704 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:36.978Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:41.979938 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:41.979Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:41.979938 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:41.979Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:46.981062 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:46.980Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:46.981062 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:46.980Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:51.981529 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:51.980Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:51.981529 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:51.980Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:56.982258 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:56.981Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:55:56.982258 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:55:56.981Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:01.983247 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:01.982Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:01.983247 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:01.982Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:06.984347 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:06.983Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:06.984347 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:06.983Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:11.985263 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:11.984Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:11.985263 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:11.984Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:14.358955 systemd[1]: Started sshd@40-147.28.180.253:22-180.101.88.239:11374.service - OpenSSH per-connection server daemon (180.101.88.239:11374). Sep 4 21:56:15.916813 sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:56:16.985961 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:16.985Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:16.985961 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:16.985Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:18.011076 sshd[2182]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:56:18.310457 sshd[2185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:56:18.310864 sshd[2185]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:56:20.149062 sshd[2182]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:56:20.447625 sshd[2186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:56:21.986335 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:21.985Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:21.986335 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:21.985Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:23.229284 sshd[2182]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:56:26.986503 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:26.985Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:26.986503 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:26.985Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:28.934969 sshd[2182]: Received disconnect from 180.101.88.239 port 11374:11: [preauth] Sep 4 21:56:28.934969 sshd[2182]: Disconnected from authenticating user root 180.101.88.239 port 11374 [preauth] Sep 4 21:56:28.938408 systemd[1]: sshd@40-147.28.180.253:22-180.101.88.239:11374.service: Deactivated successfully. Sep 4 21:56:31.987191 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:31.986Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:31.987191 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:31.986Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:36.987780 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:36.987Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:36.987780 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:36.987Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:41.988571 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:41.988Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:41.988571 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:41.988Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:46.988978 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:46.988Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:46.988978 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:46.988Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:51.989882 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:51.989Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:51.989882 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:51.989Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:56.990207 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:56.989Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:56:56.990207 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:56:56.989Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:01.990533 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:01.989Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:01.990533 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:01.989Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:06.991806 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:06.991Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:06.991806 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:06.991Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:11.992161 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:11.991Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:11.992161 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:11.991Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:16.992371 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:16.991Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:16.992371 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:16.991Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:21.993455 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:21.992Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:21.993455 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:21.992Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:26.994591 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:26.993Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:26.994591 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:26.994Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:31.995261 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:31.994Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:31.995261 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:31.994Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:36.995876 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:36.995Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:36.995876 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:36.995Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:38.958426 systemd[1]: Started sshd@41-147.28.180.253:22-180.101.88.239:13914.service - OpenSSH per-connection server daemon (180.101.88.239:13914). Sep 4 21:57:40.074562 sshd[2193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:57:41.365825 sshd[2191]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:57:41.661348 sshd[2194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:57:41.661771 sshd[2194]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:57:41.997136 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:41.996Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:41.997136 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:41.996Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:43.896285 sshd[2191]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:57:44.195629 sshd[2195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:57:46.841583 sshd[2191]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:57:46.987884 sshd[2191]: Received disconnect from 180.101.88.239 port 13914:11: [preauth] Sep 4 21:57:46.987884 sshd[2191]: Disconnected from authenticating user root 180.101.88.239 port 13914 [preauth] Sep 4 21:57:46.991299 systemd[1]: sshd@41-147.28.180.253:22-180.101.88.239:13914.service: Deactivated successfully. Sep 4 21:57:46.997552 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:46.997Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:46.997552 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:46.997Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:51.998295 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:51.997Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:51.998295 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:51.997Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:56.998782 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:56.998Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:57:56.998782 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:57:56.998Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:01.999010 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:01.998Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:01.999010 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:01.998Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:06.999627 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:06.998Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:06.999627 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:06.999Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:12.000306 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:11.999Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:12.000306 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:11.999Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:14.290375 systemd[1]: Started sshd@42-147.28.180.253:22-193.32.162.65:43610.service - OpenSSH per-connection server daemon (193.32.162.65:43610). Sep 4 21:58:15.029514 sshd[2202]: Invalid user ansible from 193.32.162.65 port 43610 Sep 4 21:58:15.208977 sshd[2202]: Connection closed by invalid user ansible 193.32.162.65 port 43610 [preauth] Sep 4 21:58:15.212118 systemd[1]: sshd@42-147.28.180.253:22-193.32.162.65:43610.service: Deactivated successfully. Sep 4 21:58:17.000958 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:17.000Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:17.000958 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:17.000Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:22.002027 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:22.001Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:22.002027 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:22.001Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:27.002338 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:27.001Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:27.002338 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:27.001Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:32.002751 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:32.002Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:32.002751 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:32.002Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:37.003606 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:37.002Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:37.003606 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:37.003Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:42.004090 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:42.003Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:42.004090 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:42.003Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:47.005376 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:47.004Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:47.005376 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:47.004Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:48.940492 systemd[1]: Started sshd@43-147.28.180.253:22-180.101.88.239:20448.service - OpenSSH per-connection server daemon (180.101.88.239:20448). Sep 4 21:58:50.331300 sshd[2210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:58:52.006347 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:52.005Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:52.006347 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:52.005Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:52.370394 sshd[2208]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:58:52.673401 sshd[2211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:58:52.673806 sshd[2211]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 21:58:54.652738 sshd[2208]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:58:54.951515 sshd[2212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 21:58:56.874961 sshd[2208]: PAM: Permission denied for root from 180.101.88.239 Sep 4 21:58:57.007365 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:57.006Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:57.007365 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:58:57.006Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:58:57.023454 sshd[2208]: Received disconnect from 180.101.88.239 port 20448:11: [preauth] Sep 4 21:58:57.023454 sshd[2208]: Disconnected from authenticating user root 180.101.88.239 port 20448 [preauth] Sep 4 21:58:57.025101 systemd[1]: sshd@43-147.28.180.253:22-180.101.88.239:20448.service: Deactivated successfully. Sep 4 21:59:02.007928 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:02.007Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:02.007928 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:02.007Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:07.008364 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:07.007Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:07.008364 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:07.007Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:12.008839 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:12.008Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:12.008839 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:12.008Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:17.009079 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:17.008Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:17.009079 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:17.008Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:22.009569 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:22.008Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:22.009569 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:22.009Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:27.009843 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:27.009Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:27.009843 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:27.009Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:32.010769 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:32.010Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:32.010769 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:32.010Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:37.011440 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:37.011Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:37.011440 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:37.011Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:42.012611 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:42.011Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:42.012611 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:42.012Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:47.012951 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:47.012Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:47.012951 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:47.012Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:52.013850 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:52.013Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:52.013850 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:52.013Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:57.014694 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:57.014Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 21:59:57.014694 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T21:59:57.014Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:02.015322 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:02.014Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:02.015322 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:02.014Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:05.303343 systemd[1]: Started sshd@44-147.28.180.253:22-180.101.88.239:20343.service - OpenSSH per-connection server daemon (180.101.88.239:20343). Sep 4 22:00:07.015632 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:07.014Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:07.015632 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:07.015Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:09.813300 sshd[2222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:00:11.029811 sshd[2218]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:00:12.015949 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:12.015Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:12.015949 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:12.015Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:13.889524 sshd[2223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:00:13.889939 sshd[2223]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 22:00:16.324986 sshd[2218]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:00:16.616274 sshd[2224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:00:17.016775 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:17.016Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:17.016775 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:17.016Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:18.128590 sshd[2218]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:00:18.279908 sshd[2218]: Received disconnect from 180.101.88.239 port 20343:11: [preauth] Sep 4 22:00:18.279908 sshd[2218]: Disconnected from authenticating user root 180.101.88.239 port 20343 [preauth] Sep 4 22:00:18.283325 systemd[1]: sshd@44-147.28.180.253:22-180.101.88.239:20343.service: Deactivated successfully. Sep 4 22:00:22.016930 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:22.016Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:22.016930 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:22.016Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:24.494289 systemd[1]: Started sshd@45-147.28.180.253:22-85.209.11.254:34024.service - OpenSSH per-connection server daemon (85.209.11.254:34024). Sep 4 22:00:26.630218 sshd[2228]: Invalid user guest from 85.209.11.254 port 34024 Sep 4 22:00:26.870741 sshd[2228]: Connection closed by invalid user guest 85.209.11.254 port 34024 [preauth] Sep 4 22:00:26.873858 systemd[1]: sshd@45-147.28.180.253:22-85.209.11.254:34024.service: Deactivated successfully. Sep 4 22:00:27.017778 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:27.017Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:27.017778 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:27.017Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:32.018161 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:32.017Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:32.018161 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:32.017Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:37.019034 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:37.018Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:37.019034 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:37.018Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:42.019830 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:42.019Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:42.019830 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:42.019Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:47.020888 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:47.020Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:47.020888 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:47.020Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:52.021363 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:52.020Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:52.021363 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:52.020Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:57.021986 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:57.021Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:00:57.021986 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:00:57.021Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:02.023150 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:02.022Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:02.023150 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:02.022Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:07.024164 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:07.023Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:07.024164 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:07.023Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:12.025323 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:12.024Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:12.025323 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:12.024Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:17.025842 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:17.025Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:17.025842 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:17.025Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:22.027035 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:22.026Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:22.027035 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:22.026Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:24.537967 systemd[1]: Started sshd@46-147.28.180.253:22-180.101.88.239:39286.service - OpenSSH per-connection server daemon (180.101.88.239:39286). Sep 4 22:01:27.027306 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:27.026Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:27.027306 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:27.026Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:27.821088 sshd[2235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:01:29.749442 sshd[2233]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:01:30.441598 sshd[2236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:01:30.442010 sshd[2236]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 22:01:32.027850 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:32.027Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:32.027850 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:32.027Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:32.450335 sshd[2233]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:01:32.754917 sshd[2237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:01:34.703333 sshd[2233]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:01:34.853825 sshd[2233]: Received disconnect from 180.101.88.239 port 39286:11: [preauth] Sep 4 22:01:34.853825 sshd[2233]: Disconnected from authenticating user root 180.101.88.239 port 39286 [preauth] Sep 4 22:01:34.857175 systemd[1]: sshd@46-147.28.180.253:22-180.101.88.239:39286.service: Deactivated successfully. Sep 4 22:01:37.029029 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:37.028Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:37.029029 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:37.028Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:42.029910 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:42.029Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:42.029910 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:42.029Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:47.030701 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:47.030Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:47.030701 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:47.030Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:52.031827 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:52.031Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:52.031827 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:52.031Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:57.032443 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:57.031Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:01:57.032443 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:01:57.031Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:02.033001 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:02.032Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:02.033001 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:02.032Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:07.033923 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:07.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:07.033923 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:07.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:12.034212 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:12.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:12.034212 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:12.033Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:17.035300 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:17.034Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:17.035300 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:17.034Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:22.035720 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:22.035Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:22.035720 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:22.035Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:27.035953 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:27.035Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:27.035953 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:27.035Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:32.036235 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:32.035Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:32.036235 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:32.035Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:37.037289 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:37.036Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:37.037289 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:37.036Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:41.626969 systemd[1]: Started sshd@47-147.28.180.253:22-180.101.88.239:64122.service - OpenSSH per-connection server daemon (180.101.88.239:64122). Sep 4 22:02:42.038286 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:42.037Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:42.038286 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:42.037Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:44.293942 sshd[2241]: Received disconnect from 180.101.88.239 port 64122:11: [preauth] Sep 4 22:02:44.293942 sshd[2241]: Disconnected from 180.101.88.239 port 64122 [preauth] Sep 4 22:02:44.296036 systemd[1]: sshd@47-147.28.180.253:22-180.101.88.239:64122.service: Deactivated successfully. Sep 4 22:02:47.038943 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:47.038Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:47.038943 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:47.038Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:52.039886 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:52.039Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:52.039886 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:52.039Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:57.040545 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:57.039Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:02:57.040545 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:02:57.040Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:02.041159 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:02.040Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:02.041159 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:02.040Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:07.041798 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:07.041Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:07.041798 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:07.041Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:12.042824 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:12.042Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:12.042824 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:12.042Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:17.043928 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:17.043Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:17.043928 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:17.043Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:22.044278 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:22.043Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:22.044278 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:22.043Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:27.045356 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:27.044Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:27.045356 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:27.044Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:32.046477 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:32.045Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:32.046477 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:32.045Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:37.047203 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:37.047Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:37.047203 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:37.047Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:42.048442 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:42.047Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:42.048442 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:42.047Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:47.049621 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:47.048Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:47.049621 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:47.049Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:52.050055 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:52.049Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:52.050055 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:52.049Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:55.973252 systemd[1]: Started sshd@48-147.28.180.253:22-180.101.88.239:56501.service - OpenSSH per-connection server daemon (180.101.88.239:56501). Sep 4 22:03:57.050609 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:57.049Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:03:57.050609 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:03:57.050Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:01.147157 sshd[2252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:04:02.050860 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:02.050Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:02.050860 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:02.050Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:03.411888 sshd[2250]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:04:03.712341 sshd[2253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:04:05.389876 sshd[2250]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:04:05.690130 sshd[2254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:04:07.050984 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:07.050Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:07.050984 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:07.050Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:07.643120 sshd[2250]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:04:08.352516 sshd[2250]: Received disconnect from 180.101.88.239 port 56501:11: [preauth] Sep 4 22:04:08.352516 sshd[2250]: Disconnected from authenticating user root 180.101.88.239 port 56501 [preauth] Sep 4 22:04:08.355914 systemd[1]: sshd@48-147.28.180.253:22-180.101.88.239:56501.service: Deactivated successfully. Sep 4 22:04:12.052595 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:12.051Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:12.052595 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:12.051Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:17.052642 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:17.052Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:17.052642 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:17.052Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:22.053778 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:22.053Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:22.053778 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:22.053Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:24.313774 systemd[1]: Started sshd@49-147.28.180.253:22-193.32.162.65:46990.service - OpenSSH per-connection server daemon (193.32.162.65:46990). Sep 4 22:04:25.026504 sshd[2259]: Invalid user ansible from 193.32.162.65 port 46990 Sep 4 22:04:25.201650 sshd[2259]: Connection closed by invalid user ansible 193.32.162.65 port 46990 [preauth] Sep 4 22:04:25.204769 systemd[1]: sshd@49-147.28.180.253:22-193.32.162.65:46990.service: Deactivated successfully. Sep 4 22:04:27.055106 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:27.054Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:27.055106 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:27.054Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:32.055960 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:32.055Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:32.055960 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:32.055Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:37.056405 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:37.055Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:37.056405 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:37.055Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:42.057034 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:42.056Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:42.057034 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:42.056Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:47.058052 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:47.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:47.058052 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:47.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:52.058265 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:52.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:52.058265 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:52.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:57.058595 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:57.057Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:04:57.058595 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:04:57.058Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:02.058926 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:02.058Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:02.058926 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:02.058Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:07.059233 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:07.058Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:07.059233 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:07.058Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:12.059709 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:12.059Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:12.059709 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:12.059Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:17.012935 systemd[1]: Started sshd@50-147.28.180.253:22-180.101.88.239:54858.service - OpenSSH per-connection server daemon (180.101.88.239:54858). Sep 4 22:05:17.060087 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:17.059Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:17.060087 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:17.059Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:22.061227 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:22.060Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:22.061227 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:22.060Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:27.062382 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:27.061Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:27.062382 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:27.061Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:27.095537 sshd[2265]: Received disconnect from 180.101.88.239 port 54858:11: [preauth] Sep 4 22:05:27.095537 sshd[2265]: Disconnected from 180.101.88.239 port 54858 [preauth] Sep 4 22:05:27.097646 systemd[1]: sshd@50-147.28.180.253:22-180.101.88.239:54858.service: Deactivated successfully. Sep 4 22:05:32.063499 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:32.062Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:32.063499 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:32.062Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:37.064106 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:37.063Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:37.064106 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:37.063Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:42.065021 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:42.064Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:42.065021 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:42.064Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:47.066083 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:47.065Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:47.066083 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:47.065Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:52.066203 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:52.065Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:52.066203 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:52.065Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:57.066626 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:57.066Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:05:57.066626 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:05:57.066Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:02.067000 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:02.066Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:02.067000 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:02.066Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:07.067895 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:07.067Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:07.067895 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:07.067Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:12.069012 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:12.068Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:12.069012 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:12.068Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:17.069311 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:17.068Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:17.069311 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:17.068Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:22.070129 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:22.069Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:22.070129 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:22.069Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:27.070832 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:27.070Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:27.070832 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:27.070Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:29.741960 systemd[1]: Started sshd@51-147.28.180.253:22-180.101.88.239:46573.service - OpenSSH per-connection server daemon (180.101.88.239:46573). Sep 4 22:06:32.071056 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:32.070Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:32.071056 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:32.070Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:32.100873 sshd[2273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:06:33.763003 sshd[2271]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:06:34.069479 sshd[2274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:06:35.671596 sshd[2271]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:06:35.967544 sshd[2275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:06:37.071599 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:37.070Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:37.071599 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:37.071Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:38.177246 sshd[2271]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:06:38.323755 sshd[2271]: Received disconnect from 180.101.88.239 port 46573:11: [preauth] Sep 4 22:06:38.323755 sshd[2271]: Disconnected from authenticating user root 180.101.88.239 port 46573 [preauth] Sep 4 22:06:38.327094 systemd[1]: sshd@51-147.28.180.253:22-180.101.88.239:46573.service: Deactivated successfully. Sep 4 22:06:42.072466 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:42.071Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:42.072466 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:42.071Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:47.073615 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:47.073Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:47.073615 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:47.073Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:52.074430 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:52.073Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:52.074430 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:52.073Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:57.074626 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:57.074Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:06:57.074626 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:06:57.074Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:02.075159 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:02.074Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:02.075159 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:02.074Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:07.075644 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:07.075Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:07.075644 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:07.075Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:12.076081 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:12.075Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:12.076081 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:12.075Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:17.076943 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:17.076Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:17.076943 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:17.076Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:22.077406 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:22.076Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:22.077406 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:22.076Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:27.078278 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:27.077Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:27.078278 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:27.077Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:32.079382 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:32.078Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:32.079382 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:32.078Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:37.080433 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:37.079Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:37.080433 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:37.079Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:42.080897 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:42.080Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:42.080897 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:42.080Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:47.081863 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:47.081Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:47.081863 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:47.081Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:50.113000 systemd[1]: Started sshd@52-147.28.180.253:22-180.101.88.239:56254.service - OpenSSH per-connection server daemon (180.101.88.239:56254). Sep 4 22:07:51.280986 sshd[2281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:07:52.082933 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:52.082Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:52.082933 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:52.082Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:52.923614 sshd[2279]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:07:55.031742 sshd[2282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:07:55.032098 sshd[2282]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 22:07:56.949911 sshd[2279]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:07:57.083194 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:57.082Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:57.083194 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:07:57.082Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:07:57.244802 sshd[2283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:07:59.047578 sshd[2279]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:07:59.195063 sshd[2279]: Received disconnect from 180.101.88.239 port 56254:11: [preauth] Sep 4 22:07:59.195063 sshd[2279]: Disconnected from authenticating user root 180.101.88.239 port 56254 [preauth] Sep 4 22:07:59.198433 systemd[1]: sshd@52-147.28.180.253:22-180.101.88.239:56254.service: Deactivated successfully. Sep 4 22:08:02.084724 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:02.083Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:02.084724 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:02.084Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:07.084908 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:07.084Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:07.084908 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:07.084Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:12.086392 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:12.085Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:12.086392 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:12.085Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:17.087000 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:17.086Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:17.087000 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:17.086Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:22.088169 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:22.087Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:22.088169 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:22.087Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:27.089317 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:27.088Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:27.089317 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:27.088Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:32.089636 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:32.089Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:32.089636 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:32.089Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:37.090519 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:37.089Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:37.090519 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:37.089Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:42.090704 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:42.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:42.090704 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:42.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:47.091062 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:47.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:47.091062 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:47.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:52.092099 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:52.091Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:52.092099 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:52.091Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:57.093352 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:57.092Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:08:57.093352 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:08:57.092Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:02.094550 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:02.093Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:02.094550 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:02.093Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:07.095638 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:07.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:07.095638 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:07.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:10.958958 systemd[1]: Started sshd@53-147.28.180.253:22-180.101.88.239:19546.service - OpenSSH per-connection server daemon (180.101.88.239:19546). Sep 4 22:09:12.090766 sshd[2294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:09:12.095906 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:12.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:12.095906 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:12.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:14.385377 sshd[2292]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:09:14.681859 sshd[2295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:09:14.682226 sshd[2295]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 22:09:16.720766 sshd[2292]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:09:17.017082 sshd[2296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:09:17.096799 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:17.096Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:17.096799 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:17.096Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:19.331691 sshd[2292]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:09:19.479196 sshd[2292]: Received disconnect from 180.101.88.239 port 19546:11: [preauth] Sep 4 22:09:19.479196 sshd[2292]: Disconnected from authenticating user root 180.101.88.239 port 19546 [preauth] Sep 4 22:09:19.482798 systemd[1]: sshd@53-147.28.180.253:22-180.101.88.239:19546.service: Deactivated successfully. Sep 4 22:09:22.097705 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:22.097Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:22.097705 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:22.097Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:27.098115 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:27.097Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:27.098115 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:27.097Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:32.099133 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:32.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:32.099133 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:32.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:37.099516 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:37.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:37.099516 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:37.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:42.100553 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:42.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:42.100553 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:42.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:47.101777 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:47.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:47.101777 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:47.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:52.102730 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:52.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:52.102730 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:52.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:57.103503 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:57.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:09:57.103503 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:09:57.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:02.104100 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:02.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:02.104100 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:02.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:07.104291 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:07.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:07.104291 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:07.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:12.105497 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:12.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:12.105497 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:12.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:17.105406 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:17.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:17.105406 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:17.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:22.106000 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:22.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:22.106000 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:22.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:22.765059 systemd[1]: Started sshd@54-147.28.180.253:22-180.101.88.239:34706.service - OpenSSH per-connection server daemon (180.101.88.239:34706). Sep 4 22:10:27.107013 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:27.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:27.107013 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:27.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:27.317294 sshd[2303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:10:29.376103 sshd[2301]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:10:29.667297 sshd[2304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:10:29.667834 sshd[2304]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 4 22:10:30.764290 systemd[1]: Started sshd@55-147.28.180.253:22-193.32.162.65:50370.service - OpenSSH per-connection server daemon (193.32.162.65:50370). Sep 4 22:10:31.496074 sshd[2306]: Invalid user hadoop from 193.32.162.65 port 50370 Sep 4 22:10:31.670761 sshd[2301]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:10:31.671849 sshd[2306]: Connection closed by invalid user hadoop 193.32.162.65 port 50370 [preauth] Sep 4 22:10:31.673507 systemd[1]: sshd@55-147.28.180.253:22-193.32.162.65:50370.service: Deactivated successfully. Sep 4 22:10:31.961522 sshd[2311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.239 user=root Sep 4 22:10:32.107836 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:32.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:32.107836 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:32.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:33.237382 sshd[2301]: PAM: Permission denied for root from 180.101.88.239 Sep 4 22:10:33.388530 sshd[2301]: Received disconnect from 180.101.88.239 port 34706:11: [preauth] Sep 4 22:10:33.388530 sshd[2301]: Disconnected from authenticating user root 180.101.88.239 port 34706 [preauth] Sep 4 22:10:33.392205 systemd[1]: sshd@54-147.28.180.253:22-180.101.88.239:34706.service: Deactivated successfully. Sep 4 22:10:37.108368 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:37.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:37.108368 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:37.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:42.109150 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:42.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:42.109150 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:42.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:47.109611 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:47.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:47.109611 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:47.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:52.109880 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:52.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:52.109880 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:52.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:57.110298 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:57.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:10:57.110298 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:10:57.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:11:02.110628 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:11:02.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:11:02.110628 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:11:02.110Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:11:07.111846 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:11:07.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"c2410338bd90d016","rtt":"224.781µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Sep 4 22:11:07.111846 etcd-wrapper[1714]: {"level":"warn","ts":"2024-09-04T22:11:07.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"c2410338bd90d016","rtt":"217.658µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"}